[SECURITY] Fedora 22 Update: php-5.6.8-1.fc22

updates at fedoraproject.org updates at fedoraproject.org
Wed Apr 22 22:52:07 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-6195
2015-04-17 17:08:18
--------------------------------------------------------------------------------

Name        : php
Product     : Fedora 22
Version     : 5.6.8
Release     : 1.fc22
URL         : http://www.php.net/
Summary     : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module (often referred to as mod_php)
which adds support for the PHP language to Apache HTTP Server.

--------------------------------------------------------------------------------
Update Information:

16 Apr 2015, **PHP 5.6.8**

Core:
* Fixed bug #66609 (php crashes with __get() and ++ operator in some cases). (Dmitry, Laruence)
* Fixed bug #68021 (get_browser() browser_name_regex returns non-utf-8 characters). (Tjerk)
* Fixed bug #68917 (parse_url fails on some partial urls). (Wei Dai)
* Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM configuration options). (Anatol Belski)
* Additional fix for bug #69152 (Type confusion vulnerability in exception::getTraceAsString). (Stas)
* Fixed bug #69210 (serialize function return corrupted data when sleep has non-string values). (Juan Basso)
* Fixed bug #69212 (Leaking VIA_HANDLER func when exception thrown in __call/... arg passing). (Nikita)
* Fixed bug #69221 (Segmentation fault when using a generator in combination with an Iterator). (Nikita)
* Fixed bug #69337 (php_stream_url_wrap_http_ex() type-confusion vulnerability). (Stas)
* Fixed bug #69353 (Missing null byte checks for paths in various PHP extensions). (Stas)

Apache2handler:
* Fixed bug #69218 (potential remote code execution with apache 2.4 apache2handler). (Gerrit Venema)

cURL:
* Implemented FR#69278 (HTTP2 support). (Masaki Kagaya)
* Fixed bug #68739 (Missing break / control flow). (Laruence)
* Fixed bug #69316 (Use-after-free in php_curl related to CURLOPT_FILE/_INFILE/_WRITEHEADER). (Laruence)

Date:
* Fixed bug #69336 (Issues with "last day of <monthname>"). (Derick Rethans)

Enchant:
* Fixed bug #65406 (Enchant broker plugins are in the wrong place in windows builds). (Anatol)

Ereg:
* Fixed bug #68740 (NULL Pointer Dereference). (Laruence)

Fileinfo:
* Fixed bug #68819 (Fileinfo on specific file causes spurious OOM and/or segfault). (Anatol Belski)

Filter:
* Fixed bug #69202: (FILTER_FLAG_STRIP_BACKTICK ignored unless other flags are used). (Jeff Welch)
* Fixed bug #69203 (FILTER_FLAG_STRIP_HIGH doesn't strip ASCII 127). (Jeff Welch)

OPCache:
* Fixed bug #69297 (function_exists strange behavior with OPCache on disabled function). (Laruence)
* Fixed bug #69281 (opcache_is_script_cached no longer works). (danack)
* Fixed bug #68677 (Use After Free). (CVE-2015-1351) (Laruence)

OpenSSL
* Fixed bugs #68853, #65137 (Buffered crypto stream data breaks IO polling in stream_select() contexts) (Chris Wright)
* Fixed bug #69197 (openssl_pkcs7_sign handles default value incorrectly) (Daniel Lowrey)
* Fixed bug #69215 (Crypto servers should send client CA list) (Daniel Lowrey)
* Add a check for RAND_egd to allow compiling against LibreSSL (Leigh)

Phar:
* Fixed bug #64343 (PharData::extractTo fails for tarball created by BSD tar). (Mike)
* Fixed bug #64931 (phar_add_file is too restrictive on filename). (Mike)
* Fixed bug #65467 (Call to undefined method cli_arg_typ_string). (Mike)
* Fixed bug #67761 (Phar::mapPhar fails for Phars inside a path containing  ".tar"). (Mike)
* Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
* Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in phar_set_inode). (Stas)

Postgres:
* Fixed bug #68741 (Null pointer dereference). (CVE-2015-1352) (Laruence)

SPL:
* Fixed bug #69227 (Use after free in zval_scan caused by spl_object_storage_get_gc). (adam dot scarr at 99designs dot com)

SOAP:
* Fixed bug #69293 (NEW segfault when using SoapClient::__setSoapHeader (bisected, regression)). (Laruence)

Sqlite3:
* Fixed bug #68760 (SQLITE segfaults if custom collator throws an exception). (Dan Ackroyd)
* Fixed bug #69287 (Upgrade bundled libsqlite to 3.8.8.3). (Anatol)
* Fixed bug #66550 (SQLite prepared statement use-after-free). (Sean Heelan)

--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1185900 - CVE-2015-1351 php: use after free in opcache extension
        https://bugzilla.redhat.com/show_bug.cgi?id=1185900
  [ 2 ] Bug #1185904 - CVE-2015-1352 php: NULL pointer dereference in pgsql extension
        https://bugzilla.redhat.com/show_bug.cgi?id=1185904
  [ 3 ] Bug #1213407 - php: missing null byte checks for paths in various PHP extensions
        https://bugzilla.redhat.com/show_bug.cgi?id=1213407
  [ 4 ] Bug #1213411 - php: use-after-free vulnerability in php_curl related to CURLOPT_FILE/_INFILE/_WRITEHEADER
        https://bugzilla.redhat.com/show_bug.cgi?id=1213411
  [ 5 ] Bug #1213416 - php: NULL pointer dereference at ext/ereg/regex/regcomp.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1213416
  [ 6 ] Bug #1213442 - php: denial of service when processing a crafted file with Fileinfo
        https://bugzilla.redhat.com/show_bug.cgi?id=1213442
  [ 7 ] Bug #1213446 - CVE-2015-2783 php: Buffer Over-read in unserialize when parsing Phar
        https://bugzilla.redhat.com/show_bug.cgi?id=1213446
  [ 8 ] Bug #1213449 - CVE-2015-3329 php: Buffer Over flow when parsing tar/zip/phar in phar_set_inode()
        https://bugzilla.redhat.com/show_bug.cgi?id=1213449
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list