| Summary: | PHP 5.5.26 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/650306/ | ||
| Whiteboard: | MGA4-32-OK advisory | ||
| Source RPM: | php-5.5.25-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-06-13 20:57:36 CEST
Several CVEs have been assigned, mostly for issues fixed in older versions of PHP: http://openwall.com/lists/oss-security/2015/06/16/12 CVE-2015-4598 applies to php#69719 fixed in this update: Incorrect handling of paths with NULs CVE request for other fixes in this update: http://openwall.com/lists/oss-security/2015/06/18/3 CVE assignment: http://openwall.com/lists/oss-security/2015/06/18/6 Advisory: ======================== Updated php packages fix security vulnerabilities: Incorrect handling of paths with NULs (CVE-2015-4598). OS command injection vulnerability in escapeshellarg (CVE-2015-4642). Integer overflow in ftp_genlist() resulting in heap overflow (CVE-2015-4643). Segfault in php_pgsql_meta_data (CVE-2015-4644). PHP has been updated to version 5.5.26, which fixes multiple bugs and potential security issues. Please see the upstream ChangeLog for details. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644 http://php.net/ChangeLog-5.php#5.5.26 http://openwall.com/lists/oss-security/2015/06/16/12 http://openwall.com/lists/oss-security/2015/06/18/6 LWN reference for CVE-2015-4598 (and several unrelated ones): http://lwn.net/Vulnerabilities/649071/ Tested Mageia 4 i586 with my old php-gd, php-dba, php-cgi, apache-mod_userdir, apache-mod_suexec test case from https://bugs.mageia.org/show_bug.cgi?id=3895#c35 Whiteboard:
(none) =>
MGA4-32-OK Advisory committed to svn. Someone from the sysadmin team please push 16115.adv to updates. Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0258.html Status:
NEW =>
RESOLVED
David Walser
2015-07-06 20:26:41 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/650306/ |