RHSA-2015:1135-1: Important: php security and bug fix update

Red Hat Enterprise Linux: Updated php packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2014-8142, CVE-2014-9652, CVE-2014-9705, CVE-2014-9709, CVE-2015-0231, CVE-2015-0232, CVE-2015-0273, CVE-2015-2301, CVE-2015-2348, CVE-2015-2783, CVE-2015-2787, CVE-2015-3307, CVE-2015-3329, CVE-2015-3330, CVE-2015-3411, CVE-2015-3412, CVE-2015-4021, CVE-2015-4022, CVE-2015-4024, CVE-2015-4025, CVE-2015-4026, CVE-2015-4147, CVE-2015-4148, CVE-2015-4598, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603, CVE-2015-4604, CVE-2015-4605

USN-2651-1: GNU patch vulnerabilities

Ubuntu Security Notice USN-2651-1

22nd June, 2015

patch vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in GNU patch.

Software description

  • patch
    – Apply a diff file to an original

Details

Jakub Wilk discovered that GNU patch did not correctly handle file paths in
patch files. An attacker could specially craft a patch file that could
overwrite arbitrary files with the privileges of the user invoking the program.
This issue only affected Ubuntu 12.04 LTS. (CVE-2010-4651)

László Böszörményi discovered that GNU patch did not correctly handle some
patch files. An attacker could specially craft a patch file that could cause a
denial of service. (CVE-2014-9637)

Jakub Wilk discovered that GNU patch did not correctly handle symbolic links in
git style patch files. An attacker could specially craft a patch file that
could overwrite arbitrary files with the privileges of the user invoking the
program. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-1196)

Jakub Wilk discovered that GNU patch did not correctly handle file renames in
git style patch files. An attacker could specially craft a patch file that
could overwrite arbitrary files with the privileges of the user invoking the
program. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-1395)

Jakub Wilk discovered the fix for CVE-2015-1196 was incomplete for GNU patch.
An attacker could specially craft a patch file that could overwrite arbitrary
files with the privileges of the user invoking the program. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-1396)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
patch

2.7.1-5ubuntu0.3
Ubuntu 14.04 LTS:
patch

2.7.1-4ubuntu2.3
Ubuntu 12.04 LTS:
patch

2.6.1-3ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2010-4651,

CVE-2014-9637,

CVE-2015-1196,

CVE-2015-1395,

CVE-2015-1396

Fedora 21 Security Update: trafficserver-5.3.0-1.fc21

Resolved Bugs
1102559 – Add AArch64 support to trafficserver
1103173 – trafficserver: insecure temporary file usage [fedora-all]
1179204 – trafficserver: incorrect handling of “Max-Forwards” header [fedora-21]
1103174 – trafficserver: insecure temporary file usage [epel-6]
1133387 – CVE-2014-3525 trafficserver: unspecified flaw related to health checks fixed in versions 4.2.1.1 and 5.0.1 [epel-6]
1179205 – trafficserver: incorrect handling of “Max-Forwards” header [epel-7]
994224 – trafficserver must be compiled with -fno-strict-aliasing, but it is not
955127 – trafficserver package should be built with PIE flags<br
https://cwiki.apache.org/confluence/display/TS/What%27s+New+in+v5.3.x

Fedora 22 Security Update: trafficserver-5.3.0-1.fc22

Resolved Bugs
1103173 – trafficserver: insecure temporary file usage [fedora-all]
1103174 – trafficserver: insecure temporary file usage [epel-6]
1102559 – Add AArch64 support to trafficserver
1179204 – trafficserver: incorrect handling of “Max-Forwards” header [fedora-21]
1133387 – CVE-2014-3525 trafficserver: unspecified flaw related to health checks fixed in versions 4.2.1.1 and 5.0.1 [epel-6]
1179205 – trafficserver: incorrect handling of “Max-Forwards” header [epel-7]
994224 – trafficserver must be compiled with -fno-strict-aliasing, but it is not
955127 – trafficserver package should be built with PIE flags<br
https://cwiki.apache.org/confluence/display/TS/What%27s+New+in+v5.3.x