- Issued:
- 2015-06-25
- Updated:
- 2015-06-25
RHSA-2015:1187 - Important: rh-php56-php security update
Synopsis
Important: rh-php56-php security update
Type/Severity
Security Advisory Important
Topic
Updated rh-php56-php packages that fix multiple security issues are now available for Red Hat Software Collections 2.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Description
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
A flaw was found in the way the PHP module for the Apache httpd web server handled pipelined requests. A remote attacker could use this flaw to trigger the execution of a PHP script in a deinitialized interpreter, causing it to crash or, possibly, execute arbitrary code. (CVE-2015-3330)
A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024)
An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022)
Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4602, CVE-2015-4603)
It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-4025, CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598)
Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021)
Multiple flaws were found in PHP's File Information (fileinfo) extension. A remote attacker could cause a PHP application to crash if it used fileinfo to identify type of attacker supplied files. (CVE-2015-4604, CVE-2015-4605)
All rh-php56-php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd24-httpd service must be restarted for the update to take effect.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Software Collections (for RHEL Workstation) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Workstation) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) from RHUI | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) from RHUI | 1 | x86_64 |
Updated Packages
- rh-php56-php-xml-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-process-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-bcmath-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-intl-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-gd-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-pspell-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-xml-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-mbstring-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-pdo-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-xmlrpc-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-mysqlnd-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-bcmath-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-gd-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-embedded-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-cli-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-recode-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-enchant-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-common-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-ldap-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-odbc-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-soap-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-pgsql-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-common-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-opcache-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-snmp-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-dbg-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-intl-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-debuginfo-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-debuginfo-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-gmp-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-dbg-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-pgsql-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-gmp-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-enchant-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-process-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-dba-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-mbstring-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-snmp-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-soap-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-opcache-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-tidy-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-devel-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-pdo-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-odbc-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-fpm-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-5.6.5-7.el6.src.rpm
- rh-php56-php-embedded-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-dba-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-mysqlnd-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-5.6.5-7.el7.src.rpm
- rh-php56-php-cli-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-ldap-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-xmlrpc-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-recode-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-devel-5.6.5-7.el7.x86_64.rpm
- rh-php56-php-imap-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-fpm-5.6.5-7.el6.x86_64.rpm
- rh-php56-php-pspell-5.6.5-7.el7.x86_64.rpm
Fixes
- This content is not included.BZ - 1213394
- This content is not included.BZ - 1213407
- This content is not included.BZ - 1213442
- This content is not included.BZ - 1213446
- This content is not included.BZ - 1213449
- This content is not included.BZ - 1222485
- This content is not included.BZ - 1223408
- This content is not included.BZ - 1223412
- This content is not included.BZ - 1223422
- This content is not included.BZ - 1223425
- This content is not included.BZ - 1223441
- This content is not included.BZ - 1232823
- This content is not included.BZ - 1232897
- This content is not included.BZ - 1232918
- This content is not included.BZ - 1232923
CVEs
- CVE-2015-2783
- CVE-2015-3307
- CVE-2015-3329
- CVE-2015-3330
- CVE-2015-4602
- CVE-2015-4603
- CVE-2015-3411
- CVE-2015-3412
- CVE-2015-4604
- CVE-2015-4605
- CVE-2015-4598
- CVE-2015-4026
- CVE-2015-4021
- CVE-2015-4022
- CVE-2015-4025
- CVE-2015-4024
- CVE-2015-4643
- CVE-2015-4644
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.