SB2015041617 - Fedora 22 update for php



SB2015041617 - Fedora 22 update for php

Published: April 16, 2015 Updated: April 24, 2025

Security Bulletin ID SB2015041617
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Use-after-free error (CVE-ID: CVE-2015-1351)

The vulnerability allows a remote attacker to cause DoS condition.

The weakness exists due to use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7. A remote attacker can trigger memory corruption and cause the service to crash.

2) NULL pointer dereference (CVE-ID: CVE-2015-1352)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dreference error in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a specially crafted name. A remote attacker can perform a denial of service (DoS) attack.


3) Buffer over-read (CVE-ID: CVE-2015-2783)

The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The weakness exists due to buffer over-read in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8. A remote attacker can obtain sensitive information from process memory or cause a denial of service via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.

4) Stack-based buffer overflow (CVE-ID: CVE-2015-3329)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8. A remote attacker can trigger memory corruption and execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.

Remediation

Install update from vendor's website.