http://www.mandriva.com/en/
______________________________
Package : php
Date : February 5, 2015
Affected: Business Server 1.0
______________________________
Problem Description:
Multiple vulnerabilities has been discovered and corrected in php:
sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x
through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read
a .php file, does not properly consider the mapping's length during
processing of an invalid file that begins with a # character and lacks
a newline character, which causes an out-of-bounds read and might (1)
allow remote attackers to obtain sensitive information from php-cgi
process memory by leveraging the ability to upload a .php file or (2)
trigger unexpected code execution if a valid PHP script is present
in memory locations adjacent to the mapping (CVE-2014-9427).
Use-after-free vulnerability in the process_nested_data function in
ext/standard/var_unserializer.
5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute
arbitrary code via a crafted unserialize call that leverages improper
handling of duplicate numerical keys within the serialized properties
of an object. NOTE: this vulnerability exists because of an incomplete
fix for CVE-2014-8142 (CVE-2015-0231).
The exif_process_unicode function in ext/exif/exif.c in PHP before
5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote
attackers to execute arbitrary code or cause a denial of service
(uninitialized pointer free and application crash) via crafted EXIF
data in a JPEG image (CVE-2015-0232).
The updated php packages have been upgraded to the 5.5.21 version
which is not vulnerable to these issues.
Additionally, the timezonedb package has been upgraded to the latest
2015.1 version, the php-suhosin package has been upgraded to the
latest 0.9.37.1 and the PECL packages which requires so has been
rebuilt for php-5.5.21.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://php.net/ChangeLog-5.
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
e10b93bf56ffd9de6bc3dc7097186d
35cf46d3f0b04ec4e4ce2516588179
380fbb305decb415730164df5966c5
cf2f06ade39ba0e5bc8c672dbfc6ff
15d498fd2fa763f5b1b2a09432b383
80c239999520eb885150c193856969
3305d51bd901f85d93b4ffb85d9fb5
37430aab4267b1577333a52591ef48
7610a03c06613e9a342983b0cfc3e0
5962886825c659cf7aa66bbf0e7bcd
a2870a53aeec993e0d73aff6b14700
d8212e3ff340631b76c1f2ee570f39
aa760f1a74519f33d412234c6b46b5
b0e1edd28c8946b8f70f904ad74f61
1ab05b3b4f388fe169a1665f845708
8df5513d5170a461c8c2c94cab77d6
5a21e187f513214c1203de6ca92bb0
74c5e7af8d5ef99fba456636d11dbc
eac42ef4b3b6dfdf5ffa2e0aefc214
deb876cfeda3f9a8eb8682f8a1acbd
22a24f2ace7196206f5d412bb0d0c2
b9281f2d656ceb0362a085213798ab
4e55d36d0e9cdcbfe9f6f2b4a66946
39ca752f1ffb768cfe1117b6884359
70d257981f63d37cd4416776f09b93
f138cbe8fefddc2fcf1bb6b4ef0e51
a6f413cf6ac533ac2c863ca3edad35
e21379d08e795a07950612e759f313
016b63d1bdac5c053f6c750f58a958
2aaba314e9d37fe4208d9cd41a889f
2400f52a1b4bc7c492905baa55276a
f0d39fc248825c8b6d575be7ac7730
a2e705d08022416e60ee865183485e
fd7b9e0d7c928547670bde3d41836a
c7c115d4b0b044b4a156719a952a3a
72229e16ce7f25cebbfd32c9bf1279
6214401d42c419b786c53b07450d31
051905065c0a836ad22a156ae8be38
d0f60e037a0b2915938544ebf4a3b0
51fa835f0b3fd0c2b6cbaf072049ad
0444aab16fb7ec45249cde7c022599
0073dd43664b44b837c6d7604d097d
ad00b9b7d118e7dd72234d4ae3937f
c20479f9036d7b7a2c7b922547d985
14e356c11403107b7f07acf1ff3d8e
f43f6ffab9717cfbe63b6d44feadce
83b4abb4f03504eaa9650dcb8afafc
1a5965f09e247f2b61c62da716db2b
7bb8c80d39970eff0e91d70a628c1f
d7d1e4862e41d327668dcdbab17b16
a8ffaebca7ac3d5cd68ea683fd96d3
47bfab007757c043a20869d9cfb3df
ef7b539f7b1bd362b0ab5132c1ed02
c221a953b4d19aa1abbb1554e1dcba
faa7f998119c8caeaf41633eebeda8
76c9cce8476b0cc570feb5f559d411
8ba094b373532be959ec091e170ec6
4ba897393ae80f5258904da4e67476
805a305e9bbe7aa4205bf2b161cfbe
f9ce38cee5e9dae0093be89dace732
69cf5f72855d32e5f482c61294e623
09b48a0e2d140c5a15b23cb2b5068a
a6aa97b047afe2bf4069b72b4a5ddd
356b7bf2e5f41cce66698a359d8062
5e7ad121c41731660209e6a3d003b1
dffe6910d0f170be5bf49fe4cd9598
e2ad6ddab9e9ed43d3ad4979c6c4f8
26e46036e5a4d4cefb4fbde1c06100
8664c4fbce6fa50245edc216e6c8e9
dba1da2ada8d7073f1d9e8bbf11b1e
2d68665ed632fa69e97cb9f8d2c7dc
94f4c00b2c83050b2c4c4713976940
3afda2f608982df1faa4b6db3c1c9a
88c51809d22c4e364ed70e1567ecca
275b50c9dfa2cc7b5244a7bece6164
ef1cf8b05352ebf671b704ecc8e54c
84245bb31cf43e549fde22690802b4
61203a18b4f0ac67117f5b0fcbf348
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą