Debian 10225 Published by

A php5 security update has been released for Debian



- -------------------------------------------------------------------------
Debian Security Advisory DSA-2974-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
July 08, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : php5
CVE ID : CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480
CVE-2014-3487 CVE-2014-3515 CVE-2014-4721

Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2014-0207

Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_read_short_sector() function.

CVE-2014-3478

Francisco Alonso of the Red Hat Security Response Team discovered a
flaw in the way the truncated pascal string size in the mconvert()
function is computed.

CVE-2014-3479

Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_check_stream_offset() function.

CVE-2014-3480

Francisco Alonso of the Red Hat Security Response Team reported an
insufficient boundary check in the cdf_count_chain() function.

CVE-2014-3487

Francisco Alonso of the Red Hat Security Response Team discovered an
incorrect boundary check in the cdf_read_property_info() funtion.

CVE-2014-3515

Stefan Esser discovered that the ArrayObject and the
SPLObjectStorage unserialize() handler do not verify the type of
unserialized data before using it. A remote attacker could use this
flaw to execute arbitrary code.

CVE-2014-4721

Stefan Esser discovered a type confusion issue affecting phpinfo(),
which might allow an attacker to obtain sensitive information from
process memory.

For the stable distribution (wheezy), these problems have been fixed in
version 5.4.4-14+deb7u12. In addition, this update contains several
bugfixes originally targeted for the upcoming Wheezy point release.

For the testing distribution (jessie), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
  DSA 2974-1: php5 security update