Bug 15721 - PHP 5.5.24
Summary: PHP 5.5.24
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/640803/
Whiteboard: has_procedure advisory mga4-64-ok mga...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-04-17 17:14 CEST by David Walser
Modified: 2015-06-23 21:01 CEST (History)
1 user (show)

See Also:
Source RPM: php-5.5.23-1.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-04-17 17:14:53 CEST
PHP version 5.5.24 and 5.6.8 have been released on April 16:
http://php.net/archive/2015.php#id2015-04-16-1
http://php.net/archive/2015.php#id2015-04-16-2

We included patches for CVE-2015-1351 and CVE-2015-1352 in our previous update (Bug 15319).

The CVE-2015-2783 issue (php#69324) issue in php-phar as well as the buffer overflow in php-phar (php#69441) are new.  A CVE has been requested for the latter issue here:
http://openwall.com/lists/oss-security/2015/04/16/22

The remote code execution with apache 2.4 (php#69218) is also new and a CVE for that has been requested here:
http://openwall.com/lists/oss-security/2015/04/17/3

There are various other use-after-free, type confusion, and segfault issues for which I have not seen CVE requests.

The ChangeLog is here:
http://www.php.net/ChangeLog-5.php#5.5.24
http://php.net/ChangeLog-5.php#5.6.8

Updates checked into Mageia 4 and Cauldron SVN.  Freeze push requested for Cauldron.

Reproducible: 

Steps to Reproduce:
David Walser 2015-04-17 18:22:59 CEST

URL: (none) => http://lwn.net/Vulnerabilities/640803/

Comment 1 David Walser 2015-04-17 22:44:09 CEST
(In reply to David Walser from comment #0)
> The CVE-2015-2783 issue (php#69324) issue in php-phar as well as the buffer
> overflow in php-phar (php#69441) are new.  A CVE has been requested for the
> latter issue here:
> http://openwall.com/lists/oss-security/2015/04/16/22

This (php#69441) now has CVE-2015-3329:
http://openwall.com/lists/oss-security/2015/04/17/6
Comment 2 David Walser 2015-04-18 00:13:36 CEST
(In reply to David Walser from comment #0)
> The remote code execution with apache 2.4 (php#69218) is also new and a CVE
> for that has been requested here:
> http://openwall.com/lists/oss-security/2015/04/17/3

This is now CVE-2015-3330:
http://openwall.com/lists/oss-security/2015/04/17/7
Comment 3 David Walser 2015-04-18 02:46:19 CEST
Advisory:
========================

Updated php packages fix security vulnerabilities:

Buffer Over-read in unserialize when parsing Phar (CVE-2015-2783).

Buffer Overflow when parsing tar/zip/phar in phar_set_inode (CVE-2015-3329).

Potential remote code execution with apache 2.4 apache2handler (CVE-2015-3330).

PHP has been updated to version 5.5.24, which fixes these issues and other
bugs.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330
http://www.php.net/ChangeLog-5.php#5.5.24
========================

Updated packages in core/updates_testing:
========================
php-ini-5.5.24-1.mga4
apache-mod_php-5.5.24-1.mga4
php-cli-5.5.24-1.mga4
php-cgi-5.5.24-1.mga4
libphp5_common5-5.5.24-1.mga4
php-devel-5.5.24-1.mga4
php-openssl-5.5.24-1.mga4
php-zlib-5.5.24-1.mga4
php-doc-5.5.24-1.mga4
php-bcmath-5.5.24-1.mga4
php-bz2-5.5.24-1.mga4
php-calendar-5.5.24-1.mga4
php-ctype-5.5.24-1.mga4
php-curl-5.5.24-1.mga4
php-dba-5.5.24-1.mga4
php-dom-5.5.24-1.mga4
php-enchant-5.5.24-1.mga4
php-exif-5.5.24-1.mga4
php-fileinfo-5.5.24-1.mga4
php-filter-5.5.24-1.mga4
php-ftp-5.5.24-1.mga4
php-gd-5.5.24-1.mga4
php-gettext-5.5.24-1.mga4
php-gmp-5.5.24-1.mga4
php-hash-5.5.24-1.mga4
php-iconv-5.5.24-1.mga4
php-imap-5.5.24-1.mga4
php-interbase-5.5.24-1.mga4
php-intl-5.5.24-1.mga4
php-json-5.5.24-1.mga4
php-ldap-5.5.24-1.mga4
php-mbstring-5.5.24-1.mga4
php-mcrypt-5.5.24-1.mga4
php-mssql-5.5.24-1.mga4
php-mysql-5.5.24-1.mga4
php-mysqli-5.5.24-1.mga4
php-mysqlnd-5.5.24-1.mga4
php-odbc-5.5.24-1.mga4
php-opcache-5.5.24-1.mga4
php-pcntl-5.5.24-1.mga4
php-pdo-5.5.24-1.mga4
php-pdo_dblib-5.5.24-1.mga4
php-pdo_firebird-5.5.24-1.mga4
php-pdo_mysql-5.5.24-1.mga4
php-pdo_odbc-5.5.24-1.mga4
php-pdo_pgsql-5.5.24-1.mga4
php-pdo_sqlite-5.5.24-1.mga4
php-pgsql-5.5.24-1.mga4
php-phar-5.5.24-1.mga4
php-posix-5.5.24-1.mga4
php-readline-5.5.24-1.mga4
php-recode-5.5.24-1.mga4
php-session-5.5.24-1.mga4
php-shmop-5.5.24-1.mga4
php-snmp-5.5.24-1.mga4
php-soap-5.5.24-1.mga4
php-sockets-5.5.24-1.mga4
php-sqlite3-5.5.24-1.mga4
php-sybase_ct-5.5.24-1.mga4
php-sysvmsg-5.5.24-1.mga4
php-sysvsem-5.5.24-1.mga4
php-sysvshm-5.5.24-1.mga4
php-tidy-5.5.24-1.mga4
php-tokenizer-5.5.24-1.mga4
php-xml-5.5.24-1.mga4
php-xmlreader-5.5.24-1.mga4
php-xmlrpc-5.5.24-1.mga4
php-xmlwriter-5.5.24-1.mga4
php-xsl-5.5.24-1.mga4
php-wddx-5.5.24-1.mga4
php-zip-5.5.24-1.mga4
php-fpm-5.5.24-1.mga4
php-apc-3.1.15-4.14.mga4
php-apc-admin-3.1.15-4.14.mga4
php-timezonedb-2015.3-1.mga4

from SRPMS:
php-5.5.24-1.mga4.src.rpm
php-apc-3.1.15-4.14.mga4.src.rpm
php-timezonedb-2015.3-1.mga4.src.rpm

Assignee: bugsquad => qa-bugs

Comment 4 David Walser 2015-04-21 18:26:50 CEST
LWN reference for CVE-2015-3329 and CVE-2015-3330:
http://lwn.net/Vulnerabilities/641243/
Comment 5 claire robinson 2015-04-24 17:30:12 CEST
Testing complete mga4 64

Tested at the same time as the wordpress update in bug 15745. Also tested zoneminder and php-apc at http://localhost/php-apc

Whiteboard: (none) => has_procedure mga4-64-ok

Comment 6 claire robinson 2015-04-24 17:57:40 CEST
Advisory uploaded.

Whiteboard: has_procedure mga4-64-ok => has_procedure advisory mga4-64-ok

Comment 7 claire robinson 2015-04-25 14:33:40 CEST
Testing complete mga4 32

Validating.

Please push to 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure advisory mga4-64-ok => has_procedure advisory mga4-64-ok mga4-32-ok
CC: (none) => sysadmin-bugs

Comment 8 Mageia Robot 2015-04-25 22:15:47 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0169.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.