SUSE-SU-2015:0370-1: moderate: Security update for php53
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Feb 25 00:08:12 MST 2015
SUSE Security Update: Security update for php53
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0370-1
Rating: moderate
References: #907519 #910659 #914690
Cross-References: CVE-2014-8142 CVE-2015-0231 CVE-2015-0232
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
PHP 5.3 was updated to fix three security issues:
* CVE-2014-8142: Use-after-free vulnerability allowed remote attackers
to execute arbitrary code via a crafted unserialize call that
leveraged improper handling of duplicate keys within the serialized
properties of an object (bnc#910659).
* CVE-2015-0231: Use-after-free vulnerability allowed remote attackers
to execute arbitrary code via a crafted unserialize call that
leveraged improper handling of duplicate numerical keys within the
serialized properties of an object. NOTE: this vulnerability exists
because of an incomplete fix for CVE-2014-8142 (bnc#910659).
* CVE-2015-0232: The exif_process_unicode function allowed remote
attackers to execute arbitrary code or cause a denial of service
(uninitialized pointer free and application crash) via crafted EXIF
data in a JPEG image (bnc#914690).
Additionally a fix was included that protects against a possible NULL
pointer use (bnc#910659).
This non-security issue has been fixed:
* Don't ignore default_socket_timeout on outgoing SSL connection
(bnc#907519)
Security Issues:
* CVE-2015-0232
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232>
* CVE-2015-0231
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231>
* CVE-2014-8142
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142>
Contraindications:
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-apache2-mod_php53=10313
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-apache2-mod_php53=10313
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-apache2-mod_php53=10313
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
php53-devel-5.3.17-0.33.1
php53-imap-5.3.17-0.33.1
php53-posix-5.3.17-0.33.1
php53-readline-5.3.17-0.33.1
php53-sockets-5.3.17-0.33.1
php53-sqlite-5.3.17-0.33.1
php53-tidy-5.3.17-0.33.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
apache2-mod_php53-5.3.17-0.33.1
php53-5.3.17-0.33.1
php53-bcmath-5.3.17-0.33.1
php53-bz2-5.3.17-0.33.1
php53-calendar-5.3.17-0.33.1
php53-ctype-5.3.17-0.33.1
php53-curl-5.3.17-0.33.1
php53-dba-5.3.17-0.33.1
php53-dom-5.3.17-0.33.1
php53-exif-5.3.17-0.33.1
php53-fastcgi-5.3.17-0.33.1
php53-fileinfo-5.3.17-0.33.1
php53-ftp-5.3.17-0.33.1
php53-gd-5.3.17-0.33.1
php53-gettext-5.3.17-0.33.1
php53-gmp-5.3.17-0.33.1
php53-iconv-5.3.17-0.33.1
php53-intl-5.3.17-0.33.1
php53-json-5.3.17-0.33.1
php53-ldap-5.3.17-0.33.1
php53-mbstring-5.3.17-0.33.1
php53-mcrypt-5.3.17-0.33.1
php53-mysql-5.3.17-0.33.1
php53-odbc-5.3.17-0.33.1
php53-openssl-5.3.17-0.33.1
php53-pcntl-5.3.17-0.33.1
php53-pdo-5.3.17-0.33.1
php53-pear-5.3.17-0.33.1
php53-pgsql-5.3.17-0.33.1
php53-pspell-5.3.17-0.33.1
php53-shmop-5.3.17-0.33.1
php53-snmp-5.3.17-0.33.1
php53-soap-5.3.17-0.33.1
php53-suhosin-5.3.17-0.33.1
php53-sysvmsg-5.3.17-0.33.1
php53-sysvsem-5.3.17-0.33.1
php53-sysvshm-5.3.17-0.33.1
php53-tokenizer-5.3.17-0.33.1
php53-wddx-5.3.17-0.33.1
php53-xmlreader-5.3.17-0.33.1
php53-xmlrpc-5.3.17-0.33.1
php53-xmlwriter-5.3.17-0.33.1
php53-xsl-5.3.17-0.33.1
php53-zip-5.3.17-0.33.1
php53-zlib-5.3.17-0.33.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
apache2-mod_php53-5.3.17-0.33.1
php53-5.3.17-0.33.1
php53-bcmath-5.3.17-0.33.1
php53-bz2-5.3.17-0.33.1
php53-calendar-5.3.17-0.33.1
php53-ctype-5.3.17-0.33.1
php53-curl-5.3.17-0.33.1
php53-dba-5.3.17-0.33.1
php53-dom-5.3.17-0.33.1
php53-exif-5.3.17-0.33.1
php53-fastcgi-5.3.17-0.33.1
php53-fileinfo-5.3.17-0.33.1
php53-ftp-5.3.17-0.33.1
php53-gd-5.3.17-0.33.1
php53-gettext-5.3.17-0.33.1
php53-gmp-5.3.17-0.33.1
php53-iconv-5.3.17-0.33.1
php53-intl-5.3.17-0.33.1
php53-json-5.3.17-0.33.1
php53-ldap-5.3.17-0.33.1
php53-mbstring-5.3.17-0.33.1
php53-mcrypt-5.3.17-0.33.1
php53-mysql-5.3.17-0.33.1
php53-odbc-5.3.17-0.33.1
php53-openssl-5.3.17-0.33.1
php53-pcntl-5.3.17-0.33.1
php53-pdo-5.3.17-0.33.1
php53-pear-5.3.17-0.33.1
php53-pgsql-5.3.17-0.33.1
php53-pspell-5.3.17-0.33.1
php53-shmop-5.3.17-0.33.1
php53-snmp-5.3.17-0.33.1
php53-soap-5.3.17-0.33.1
php53-suhosin-5.3.17-0.33.1
php53-sysvmsg-5.3.17-0.33.1
php53-sysvsem-5.3.17-0.33.1
php53-sysvshm-5.3.17-0.33.1
php53-tokenizer-5.3.17-0.33.1
php53-wddx-5.3.17-0.33.1
php53-xmlreader-5.3.17-0.33.1
php53-xmlrpc-5.3.17-0.33.1
php53-xmlwriter-5.3.17-0.33.1
php53-xsl-5.3.17-0.33.1
php53-zip-5.3.17-0.33.1
php53-zlib-5.3.17-0.33.1
References:
http://support.novell.com/security/cve/CVE-2014-8142.html
http://support.novell.com/security/cve/CVE-2015-0231.html
http://support.novell.com/security/cve/CVE-2015-0232.html
https://bugzilla.suse.com/907519
https://bugzilla.suse.com/910659
https://bugzilla.suse.com/914690
http://download.suse.com/patch/finder/?keywords=d995557afd07f1b2263c5f7bf3e0ca0b
More information about the sle-security-updates
mailing list