- Issued:
- 2015-07-09
- Updated:
- 2015-07-09
RHSA-2015:1219 - Moderate: php54-php security update
Synopsis
Moderate: php54-php security update
Type/Severity
Security Advisory Moderate
Topic
Updated php54-php packages that fix multiple security issues are now available for Red Hat Software Collections 2.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Description
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024)
An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022)
It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-4025, CVE-2015-4026, CVE-2015-4598)
An integer underflow flaw leading to out-of-bounds memory access was found in the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-4021)
All php54-php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd service must be restarted for the update to take effect.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Software Collections (for RHEL Workstation) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Workstation) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) from RHUI | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) from RHUI | 1 | x86_64 |
Updated Packages
- php54-php-odbc-5.4.40-3.el6.x86_64.rpm
- php54-php-bcmath-5.4.40-3.el6.x86_64.rpm
- php54-php-ldap-5.4.40-3.el6.x86_64.rpm
- php54-php-xml-5.4.40-3.el6.x86_64.rpm
- php54-php-imap-5.4.40-3.el6.x86_64.rpm
- php54-php-5.4.40-3.el6.x86_64.rpm
- php54-php-common-5.4.40-3.el6.x86_64.rpm
- php54-php-5.4.40-3.el6.src.rpm
- php54-php-debuginfo-5.4.40-3.el7.x86_64.rpm
- php54-php-pgsql-5.4.40-3.el7.x86_64.rpm
- php54-php-gd-5.4.40-3.el6.x86_64.rpm
- php54-php-ldap-5.4.40-3.el7.x86_64.rpm
- php54-php-recode-5.4.40-3.el6.x86_64.rpm
- php54-php-process-5.4.40-3.el6.x86_64.rpm
- php54-php-mysqlnd-5.4.40-3.el7.x86_64.rpm
- php54-php-5.4.40-3.el7.x86_64.rpm
- php54-php-pdo-5.4.40-3.el7.x86_64.rpm
- php54-php-debuginfo-5.4.40-3.el6.x86_64.rpm
- php54-php-pgsql-5.4.40-3.el6.x86_64.rpm
- php54-php-snmp-5.4.40-3.el7.x86_64.rpm
- php54-php-pspell-5.4.40-3.el7.x86_64.rpm
- php54-php-common-5.4.40-3.el7.x86_64.rpm
- php54-php-bcmath-5.4.40-3.el7.x86_64.rpm
- php54-php-xmlrpc-5.4.40-3.el7.x86_64.rpm
- php54-php-tidy-5.4.40-3.el6.x86_64.rpm
- php54-php-mbstring-5.4.40-3.el6.x86_64.rpm
- php54-php-intl-5.4.40-3.el6.x86_64.rpm
- php54-php-dba-5.4.40-3.el6.x86_64.rpm
- php54-php-5.4.40-3.el7.src.rpm
- php54-php-soap-5.4.40-3.el6.x86_64.rpm
- php54-php-intl-5.4.40-3.el7.x86_64.rpm
- php54-php-devel-5.4.40-3.el7.x86_64.rpm
- php54-php-recode-5.4.40-3.el7.x86_64.rpm
- php54-php-enchant-5.4.40-3.el7.x86_64.rpm
- php54-php-cli-5.4.40-3.el7.x86_64.rpm
- php54-php-pdo-5.4.40-3.el6.x86_64.rpm
- php54-php-xml-5.4.40-3.el7.x86_64.rpm
- php54-php-pspell-5.4.40-3.el6.x86_64.rpm
- php54-php-soap-5.4.40-3.el7.x86_64.rpm
- php54-php-mysqlnd-5.4.40-3.el6.x86_64.rpm
- php54-php-cli-5.4.40-3.el6.x86_64.rpm
- php54-php-snmp-5.4.40-3.el6.x86_64.rpm
- php54-php-process-5.4.40-3.el7.x86_64.rpm
- php54-php-enchant-5.4.40-3.el6.x86_64.rpm
- php54-php-fpm-5.4.40-3.el6.x86_64.rpm
- php54-php-mbstring-5.4.40-3.el7.x86_64.rpm
- php54-php-odbc-5.4.40-3.el7.x86_64.rpm
- php54-php-xmlrpc-5.4.40-3.el6.x86_64.rpm
- php54-php-gd-5.4.40-3.el7.x86_64.rpm
- php54-php-fpm-5.4.40-3.el7.x86_64.rpm
- php54-php-dba-5.4.40-3.el7.x86_64.rpm
- php54-php-devel-5.4.40-3.el6.x86_64.rpm
Fixes
- This content is not included.BZ - 1222485
- This content is not included.BZ - 1223408
- This content is not included.BZ - 1223412
- This content is not included.BZ - 1223422
- This content is not included.BZ - 1223425
- This content is not included.BZ - 1232897
CVEs
- CVE-2015-4598
- CVE-2015-4026
- CVE-2015-4021
- CVE-2015-4022
- CVE-2015-4025
- CVE-2015-4024
- CVE-2015-4643
- CVE-2015-4644
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.