Mandriva Linux Security Advisory MDVSA-2014:130
http://www.mandriva.com/en/
______________________________
Package : php
Date : July 9, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Updated php packages fix security vulnerabilities:
The unserialize() function in PHP before 5.4.30 and 5.5.14 has a Type
Confusion issue related to the SPL ArrayObject and SPLObjectStorage
Types (CVE-2014-3515).
It was discovered that PHP is vulnerable to a heap-based buffer
overflow in the DNS TXT record parsing. A malicious server or
man-in-the-middle attacker could possibly use this flaw to execute
arbitrary code as the PHP interpreter if a PHP application uses
dns_get_record() to perform a DNS query (CVE-2014-4049).
A flaw was found in the way file parsed property information from
Composite Document Files (CDF) files, where the mconvert() function did
not correctly compute the truncated pascal string size (CVE-2014-3478).
Multiple flaws were found in the way file parsed property information
from Composite Document Files (CDF) files, due to insufficient boundary
checks on buffers (CVE-2014-0207, CVE-2014-3479, CVE-2014-3480,
CVE-2014-3487).
PHP contains a bundled copy of the file utility's libmagic library,
so it was vulnerable to this issue. It has been updated to versions
5.5.14, which fix this issue and several other bugs.
The phpinfo() function in PHP before 5.4.30 and 5.5.14 has a Type
Confusion issue that can cause it to leak arbitrary process memory
(CVE-2014-4721).
Additionally, php-apc has been rebuilt against the updated php
packages and the php-timezonedb packages has been upgraded to the
2014.5 version.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://www.php.net/ChangeLog-
http://advisories.mageia.org/
______________________________
_______
Updated Packages:
Mandriva Business Server 1/X86_64:
d750f3a4dd445dfff5d48c2cd335f5
bd6c38473df5579c601717197e0b38
438c5c236dd05aaf8f7df1aef41402
a52f3e744008e04d0136b8ecacee95
0f8c84efaeb06e7db89942525195da
b0199c32c7bee5c4b17919db7d8419
9bd5ffbaf938d31fd5f9de5ed69d31
c08143e0bcfac5d80136114d43157f
8e6d23960410e1232e6810d5b3c917
3489e684a75c2025b795ef8812f9a6
6258c812ae9dd1ed984d707ef702e5
34d78b00a2c29b01afd140f7e9af7a
f5291102bb3825e22f7b48e750a8fc
26bb707cceccc837d09e1e910f9ff2
25136ba7b5fa05754b785aadb646da
4883b77f434fb92f66b5c9d25d1bb7
d6344ab3bbf9bcc1acc6c88cc4a232
f2c02261ca1827f8c1277e1f9010a3
d61863b92ae06460d19a1927986fda
f7b5b349884f7f733270f76bae3adb
6a5922f4ce756fb7beb4f1547d9400
59ea194bdd3fd658e4cae8991abf8a
75a19794726b72db481fdfcbdf85a3
9000903f2268d2abebc2c968c8a3fe
d1b21d9cb29de195df99e26e165dd8
c3bce91b1e2399f0294d30c7cc8c34
aefdb8dc9393e62379d9ef7ba7a617
7fc0430ee471f866ccbc4b7182644f
efbab2d1304ec348e50ef54173cb21
8ec9d6719adb5c4b52232eae273c42
c669eb5a0a166f79f2974501c74b82
d731c3140fc17387b03509675c64f8
bd3bdddd6d15d51b43af92b2d77c2d
05a9d03e68a7538b279f7a1b775fb7
9fc1b49a1356e02944985baae0fbdf
df58c5d755b84a84797343e6e2644d
f510fbd63f4e1f6bbacef83d80c1f0
454575e0713f5ec8d9438aac6fdefb
aa908adcb75e0784e631a9c8163aa8
204eb99a6af84b86bfd62d37f76136
384be6b92e3664f1286923c940a0c0
9c01c1dd40cd979b7148bde98e06ce
e1b9beede3435186533c4b1d9fabb0
19ef3e72992d4b3e7c42045b23ecc8
29337cc01f7bad7d6deb1a34f2b46d
418855d92dcfd0b2ba968971ddc7f9
7ac2ec094e86e7b663cd5db5de33f6
b31dd5a24d9e9ed9e710034b51b2aa
38e0f890a62ac31f553e1cf71e3ed4
ea61eec1783b3ecc2aabaa073781d2
c074e154df76d47e8474b2b181c810
34059ca8e564d6fba8ddb9b13816b4
5b22a942a47f9572baa7f4dbac4261
3c29ec2e950740f836a010aa7140e3
44661960b2972161a27fd60f44f6a3
80a972ae51d5e3f9dbc48e688b56c4
04a34ac96ea1bc8690e16a185b06c8
f5c01919ebd495a9bba529312ef615
bf23ff3ca37a590ea171523f008086
2ebd5df6114b163da35d4ccc76d9f6
e4d94b4e8211b0d0e9c4aa5e39b607
fe4b07b96f8a70da15d54caba9d659
ca8eb25cffa9574e83328dcc2e8e1e
316e394027c266537924232f436075
c9686b9ac17c643aafba60698dc695
abb31c2cc4b8dd2afc098e20d5c2e3
423b83dc99cb338845198e98b8900b
3066b5b1bc337fb578fcf975a8bf76
479948b9c9dd16fc01d974aa72eba3
92a0c3926501e5e18cd60dc2646031
2acde2f8f5f2061f71ecdf5bab85e0
f2a5ce6dc32e017f21ad745a7179fa
386f79ebfcfbcd1448609143b3401d
7dc3ab0433d95a8a5a315d00e83269
9f9d447b3b77be38f5cd1196891eb3
1ae42e12e9399b837472724ee456af
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą