Resolved Bugs
1199103 – CVE-2015-0252 xerces-c: crashes on malformed input
1204019 – CVE-2015-0252 mingw-xerces-c: xerces-c: crashes on malformed input [fedora-all]<br
Security fix for CVE-2015-0252.
Monthly Archives: March 2015
Fedora 21 Security Update: libXfont-1.5.1-1.fc21
Resolved Bugs
1203720 – CVE-2015-1804 CVE-2015-1802 CVE-2015-1803 libXfont: various flaws [fedora-all]
1203715 – CVE-2015-1802 libXfont: missing range check in bdfReadProperties
1203718 – CVE-2015-1803 libXfont: crash on invalid read in bdfReadCharacters
1203719 – CVE-2015-1804 libXfont: out-of-bounds memory access in bdfReadCharacters<br
Security fix for CVE-2015-1802, CVE-2015-1803, CVE-2015-1804
Fedora 21 Security Update: php-5.6.7-1.fc21
**19 Mar 2015, PHP 5.6.7**
Core:
* Fixed bug #69174 (leaks when unused inner class use traits precedence). (Laruence)
* Fixed bug #69139 (Crash in gc_zval_possible_root on unserialize). (Laruence)
* Fixed bug #69121 (Segfault in get_current_user when script owner is not in passwd with ZTS build). (dan at syneto dot net)
* Fixed bug #65593 (Segfault when calling ob_start from output buffering callback). (Mike)
* Fixed bug #68986 (pointer returned by php_stream_fopen_temporary_file not validated in memory.c). (nayana at ddproperty dot com)
* Fixed bug #68166 (Exception with invalid character causes segv). (Rasmus)
* Fixed bug #69141 (Missing arguments in reflection info for some builtin functions). (kostyantyn dot lysyy at oracle dot com)
* Fixed bug #68976 (Use After Free Vulnerability in unserialize()) (CVE-2015-0231). (Stas)
* Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM configuration options). (Anatol Belski)
* Fixed bug #69207 (move_uploaded_file allows nulls in path). (Stas)
CGI:
* Fixed bug #69015 (php-cgi’s getopt does not see $argv). (Laruence)
CLI:
* Fixed bug #67741 (auto_prepend_file messes up __LINE__). (Reeze Xia)
cURL:
* Fixed bug #69088 (PHP_MINIT_FUNCTION does not fully initialize cURL on Win32). (Grant Pannell)
* Add CURLPROXY_SOCKS4A and CURLPROXY_SOCKS5_HOSTNAME constants if supported by libcurl. (Linus Unneback)
Ereg:
* Fixed bug #69248 (heap overflow vulnerability in regcomp.c) (CVE-2015-2305). (Stas)
FPM:
* Fixed bug #68822 (request time is reset too early). (honghu069 at 163 dot com)
ODBC:
* Fixed bug #68964 (Allowed memory size exhausted with odbc_exec). (Anatol)
Opcache:
* Fixed bug #69159 (Opcache causes problem when passing a variable variable to a function). (Dmitry, Laruence)
* Fixed bug #69125 (Array numeric string as key). (Laruence)
* Fixed bug #69038 (switch(SOMECONSTANT) misbehaves). (Laruence)
OpenSSL:
* Fixed bug #68912 (Segmentation fault at openssl_spki_new). (Laruence)
* Fixed bug #61285, #68329, #68046, #41631 (encrypted streams don’t observe socket timeouts). (Brad Broerman)
* Fixed bug #68920 (use strict peer_fingerprint input checks) (Daniel Lowrey)
* Fixed bug #68879 (IP Address fields in subjectAltNames not used) (Daniel Lowrey)
* Fixed bug #68265 (SAN match fails with trailing DNS dot) (Daniel Lowrey)
* Fixed bug #67403 (Add signatureType to openssl_x509_parse) (Daniel Lowrey)
* Fixed bug (#69195 Inconsistent stream crypto values across versions) (Daniel Lowrey)
pgsql:
* Fixed bug #68638 (pg_update() fails to store infinite values). (william dot welter at 4linux dot com dot br, Laruence)
Readline:
* Fixed bug #69054 (Null dereference in readline_(read|write)_history() without parameters). (Laruence)
SOAP:
* Fixed bug #69085 (SoapClient’s __call() type confusion through unserialize()). (andrea dot palazzo at truel dot it, Laruence)
SPL:
* Fixed bug #69108 (“Segmentation fault” when (de)serializing SplObjectStorage). (Laruence)
* Fixed bug #68557 (RecursiveDirectoryIterator::seek(0) broken after calling getChildren()). (Julien)
ZIP:
* Fixed bug #69253 (ZIP Integer Overflow leads to writing past heap boundary) (CVE-2015-2331). (Stas)
Fedora 22 Security Update: drupal7-7.35-1.fc22
– Upstream release notes: https://www.drupal.org/drupal-7.35-release-notes
– Official security advisory: https://www.drupal.org/SA-CORE-2015-001
Fedora 20 Security Update: php-5.5.23-1.fc20
**19 Mar 2015, PHP 5.5.23**
Core:
* Fixed bug #69174 (leaks when unused inner class use traits precedence). (Laruence)
* Fixed bug #69139 (Crash in gc_zval_possible_root on unserialize). (Laruence)
* Fixed bug #69121 (Segfault in get_current_user when script owner is not in passwd with ZTS build). (dan at syneto dot net)
* Fixed bug #65593 (Segfault when calling ob_start from output buffering callback). (Mike)
* Fixed bug #69017 (Fail to push to the empty array with the constant value defined in class scope). (Laruence)
* Fixed bug #68986 (pointer returned by php_stream_fopen_temporary_file not validated in memory.c). (nayana at ddproperty dot com)
* Fixed bug #68166 (Exception with invalid character causes segv). (Rasmus)
* Fixed bug #69141 (Missing arguments in reflection info for some builtin functions). (kostyantyn dot lysyy at oracle dot com)
* Fixed bug #68976 (Use After Free Vulnerability in unserialize()). (Stas)
* Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM configuration options). (Anatol Belski)
* Fixed bug #69207 (move_uploaded_file allows nulls in path). (Stas)
CGI:
* Fixed bug #69015 (php-cgi’s getopt does not see $argv). (Laruence)
CLI:
* Fixed bug #67741 (auto_prepend_file messes up __LINE__). (Reeze Xia)
cURL:
* Fixed bug #69088 (PHP_MINIT_FUNCTION does not fully initialize cURL on Win32). (Grant Pannell)
* Add CURLPROXY_SOCKS4A and CURLPROXY_SOCKS5_HOSTNAME constants if supported by libcurl. (Linus Unneback)
Ereg:
* Fixed bug #69248 (heap overflow vulnerability in regcomp.c). (Stas)
FPM:
* Fixed bug #68822 (request time is reset too early). (honghu069 at 163 dot com)
ODBC:
* Fixed bug #68964 (Allowed memory size exhausted with odbc_exec). (Anatol)
Opcache:
* Fixed bug #69125 (Array numeric string as key). (Laruence)
* Fixed bug #69038 (switch(SOMECONSTANT) misbehaves). (Laruence)
OpenSSL:
* Fixed bugs #61285, #68329, #68046, #41631 (encrypted streams don’t observe socket timeouts). (Brad Broerman)
pgsql:
* Fixed bug #68638 (pg_update() fails to store infinite values). (william dot welter at 4linux dot com dot br, Laruence)
Readline:
* Fixed bug #69054 (Null dereference in readline_(read|write)_history() without parameters). (Laruence)
SOAP:
* Fixed bug #69085 (SoapClient’s __call() type confusion through unserialize()). (andrea dot palazzo at truel dot it, Laruence)
SPL:
* Fixed bug #69108 (“Segmentation fault” when (de)serializing SplObjectStorage). (Laruence)
* Fixed bug #68557 (RecursiveDirectoryIterator::seek(0) broken after calling getChildren()). (Julien)
ZIP:
* Fixed bug #69253 (ZIP Integer Overflow leads to writing past heap boundary) (CVE-2015-2331). (Stas)
Vuln: Oracle Java SE CVE-2015-0406 Remote Java SE Vulnerability
Oracle Java SE CVE-2015-0406 Remote Java SE Vulnerability
Vuln: Oracle Java SE CVE-2015-0412 Remote Java SE Vulnerability
Oracle Java SE CVE-2015-0412 Remote Java SE Vulnerability
Vuln: Oracle Java SE CVE-2014-6549 Remote Java SE Vulnerability
Oracle Java SE CVE-2014-6549 Remote Java SE Vulnerability
Apple Releases Security Update for OS X Yosemite
Original release date: March 20, 2015
Apple has released Security Update 2015-003 for OS X Yosemite v10.10.2 to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system.
US-CERT encourages users and administrators to review Apple Security Update 2015-003 and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Mozilla Releases Security Updates for Firefox, Firefox ESR, and SeaMonkey
Original release date: March 20, 2015
The Mozilla Foundation has released security updates to address vulnerabilities in Firefox, Firefox ESR, and SeaMonkey. Exploitation of these vulnerabilities may allow a remote attacker to take control of an affected system.
Available updates include:
- Firefox 36.0.3
- Firefox ESR 31.5.2
- SeaMonkey 2.33.1
Users and administrators are encouraged to review the Security Advisories for Firefox, Firefox ESR, and SeaMonkey and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.