Advisories ยป MGASA-2014-0284

Updated php packages fix multiple vulnerabilities

Publication date: 08 Jul 2014
Modification date: 08 Jul 2014
Type: security
Affected Mageia releases : 4
CVE: CVE-2014-0207 , CVE-2014-3478 , CVE-2014-3479 , CVE-2014-3480 , CVE-2014-3487 , CVE-2014-3515 , CVE-2014-4049 , CVE-2014-4721

Description

Updated php packages fix security vulnerabilities:

The unserialize() function in PHP before 5.4.30 and 5.5.14 has a Type
Confusion issue related to the SPL ArrayObject and SPLObjectStorage Types
(CVE-2014-3515).

It was discovered that PHP is vulnerable to a heap-based buffer overflow in
the DNS TXT record parsing. A malicious server or man-in-the-middle attacker
could possibly use this flaw to execute arbitrary code as the PHP interpreter
if a PHP application uses dns_get_record() to perform a DNS query
(CVE-2014-4049).

A flaw was found in the way file parsed property information from Composite
Document Files (CDF) files, where the mconvert() function did not correctly
compute the truncated pascal string size (CVE-2014-3478).

Multiple flaws were found in the way file parsed property information from
Composite Document Files (CDF) files, due to insufficient boundary checks on
buffers (CVE-2014-0207, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487).

PHP contains a bundled copy of the file utility's libmagic library, so it was
vulnerable to this issue. It has been updated to versions 5.4.30 and 5.5.14,
which fix this issue and several other bugs.

The phpinfo() function in PHP before 5.4.30 and 5.5.14 has a Type Confusion
issue that can cause it to leak arbitrary process memory (CVE-2014-4721).

Additionally, php-apc has been rebuilt against the updated php packages.
                

References

SRPMS

4/core