--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2019-4d93cf2b34
2019-05-17 01:18:20.521154
--------------------------------------------------------------------------------Name        : php-typo3-phar-stream-wrapper
Product     : Fedora 28
Version     : 3.1.1
Release     : 1.fc28
URL         : https://github.com/TYPO3/phar-stream-wrapper
Summary     : Interceptors for PHP's native phar:// stream handling
Description :
Interceptors for PHP's native phar:// stream handling.

Autoloader: /usr/share/php/TYPO3/PharStreamWrapper/autoload.php

--------------------------------------------------------------------------------Update Information:

- [3.1.1](https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1)
- [TYPO3-PSA-2019-007](https://typo3.org/security/advisory/typo3-psa-2019-007/)
/ [CVE-2019-11831](https://nvd.nist.gov/vuln/detail/CVE-2019-11831)     -[TYPO3-PSA-2019-008](https://typo3.org/security/advisory/typo3-psa-2019-008/) /
[CVE-2019-11830](https://nvd.nist.gov/vuln/detail/CVE-2019-11830) -[3.1.0](https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.0)
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1708649 - CVE-2019-11831 phar-stream-wrapper: TYP03 does not prevent directory traversal resulting in bypass of deserialization of protection mechanism
        https://bugzilla.redhat.com/show_bug.cgi?id=1708649
  [ 2 ] Bug #1708646 - CVE-2019-11830 phar-stream-wrapper: mishandling of phar stub parsing leads to bypass a deserialization of protection mechanism
        https://bugzilla.redhat.com/show_bug.cgi?id=1708646
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-4d93cf2b34' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Fedora 28: php-typo3-phar-stream-wrapper Security Update

May 16, 2019
- [3.1.1](https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1) - [TYPO3-PSA-2019-007](https://typo3.org/security/advisory/typo3-psa-2019-007/) / [CVE-2019-11831](https...

Summary

Interceptors for PHP's native phar:// stream handling.

Autoloader: /usr/share/php/TYPO3/PharStreamWrapper/autoload.php

- [3.1.1](https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1)

- [TYPO3-PSA-2019-007](https://typo3.org/security/advisory/typo3-psa-2019-007/)

/ [CVE-2019-11831](https://nvd.nist.gov/vuln/detail/CVE-2019-11831) -[TYPO3-PSA-2019-008](https://typo3.org/security/advisory/typo3-psa-2019-008/) /

[CVE-2019-11830](https://nvd.nist.gov/vuln/detail/CVE-2019-11830) -[3.1.0](https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.0)

[ 1 ] Bug #1708649 - CVE-2019-11831 phar-stream-wrapper: TYP03 does not prevent directory traversal resulting in bypass of deserialization of protection mechanism

https://bugzilla.redhat.com/show_bug.cgi?id=1708649

[ 2 ] Bug #1708646 - CVE-2019-11830 phar-stream-wrapper: mishandling of phar stub parsing leads to bypass a deserialization of protection mechanism

https://bugzilla.redhat.com/show_bug.cgi?id=1708646

su -c 'dnf upgrade --advisory FEDORA-2019-4d93cf2b34' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

FEDORA-2019-4d93cf2b34 2019-05-17 01:18:20.521154 Product : Fedora 28 Version : 3.1.1 Release : 1.fc28 URL : https://github.com/TYPO3/phar-stream-wrapper Summary : Interceptors for PHP's native phar:// stream handling Description : Interceptors for PHP's native phar:// stream handling. Autoloader: /usr/share/php/TYPO3/PharStreamWrapper/autoload.php - [3.1.1](https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1) - [TYPO3-PSA-2019-007](https://typo3.org/security/advisory/typo3-psa-2019-007/) / [CVE-2019-11831](https://nvd.nist.gov/vuln/detail/CVE-2019-11831) -[TYPO3-PSA-2019-008](https://typo3.org/security/advisory/typo3-psa-2019-008/) / [CVE-2019-11830](https://nvd.nist.gov/vuln/detail/CVE-2019-11830) -[3.1.0](https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.0) [ 1 ] Bug #1708649 - CVE-2019-11831 phar-stream-wrapper: TYP03 does not prevent directory traversal resulting in bypass of deserialization of protection mechanism https://bugzilla.redhat.com/show_bug.cgi?id=1708649 [ 2 ] Bug #1708646 - CVE-2019-11830 phar-stream-wrapper: mishandling of phar stub parsing leads to bypass a deserialization of protection mechanism https://bugzilla.redhat.com/show_bug.cgi?id=1708646 su -c 'dnf upgrade --advisory FEDORA-2019-4d93cf2b34' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Change Log

References

Update Instructions

Severity
Product : Fedora 28
Version : 3.1.1
Release : 1.fc28
URL : https://github.com/TYPO3/phar-stream-wrapper
Summary : Interceptors for PHP's native phar:// stream handling

Related News