Updated php packages fix security vulnerabilities
Publication date: 04 Apr 2014Modification date: 04 Apr 2014
Type: security
Affected Mageia releases : 3
CVE: CVE-2013-6712 , CVE-2014-1943 , CVE-2014-2270
Description
Updated php packages fix security vulnerabilities: It was discovered that the file utility contains a flaw in the handling of "indirect" magic rules in the libmagic library, which leads to an infinite recursion when trying to determine the file type of certain files (CVE-2014-1943). A flaw was found in the way the file utility determined the type of Portable Executable (PE) format files, the executable format used on Windows. A malicious PE file could cause the file utility to crash or, potentially, execute arbitrary code (CVE-2014-2270). PHP contains a bundled copy of the file utility's libmagic library, so it was vulnerable to these issues. It has been updated to version 5.4.26, which fixes these issues and several other bugs. This update also fixes a heap buffer over-read in DateInterval, which was fixed in PHP 5.4.24 (CVE-2013-6712). Also, the timezonedb PHP PECL module has been updated to its newest version. Additionally, php-apc has been rebuilt against the updated php package.
References
- http://www.php.net/ChangeLog-5.php#5.4.24
- http://www.php.net/ChangeLog-5.php#5.4.25
- http://www.php.net/ChangeLog-5.php#5.4.26
- http://pecl.php.net/package-changelog.php?package=timezonedb&release=2013.9
- http://advisories.mageia.org/MGASA-2014-0092.html
- http://advisories.mageia.org/MGASA-2014-0123.html
- https://bugs.mageia.org/show_bug.cgi?id=13017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270
SRPMS
3/core
- php-5.4.26-1.mga3
- php-gd-bundled-5.4.26-1.mga3
- php-apc-3.1.14-7.6.mga3
- php-timezonedb-2014.1-1.mga3