Fedora 21 : php-5.6.7-1.fc21 (2015-4236)

medium Nessus Plugin ID 82435
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Fedora host is missing a security update.


**19 Mar 2015, PHP 5.6.7**

Core :

- Fixed bug #69174 (leaks when unused inner class use traits precedence). (Laruence)

- Fixed bug #69139 (Crash in gc_zval_possible_root on unserialize). (Laruence)

- Fixed bug #69121 (Segfault in get_current_user when script owner is not in passwd with ZTS build). (dan at syneto dot net)

- Fixed bug #65593 (Segfault when calling ob_start from output buffering callback). (Mike)

- Fixed bug #68986 (pointer returned by php_stream_fopen_temporary_file not validated in memory.c). (nayana at ddproperty dot com)

- Fixed bug #68166 (Exception with invalid character causes segv). (Rasmus)

- Fixed bug #69141 (Missing arguments in reflection info for some builtin functions). (kostyantyn dot lysyy at oracle dot com)

- Fixed bug #68976 (Use After Free Vulnerability in unserialize()) (CVE-2015-0231). (Stas)

- Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM configuration options). (Anatol Belski)

- Fixed bug #69207 (move_uploaded_file allows nulls in path). (Stas)


- Fixed bug #69015 (php-cgi's getopt does not see $argv).


- Fixed bug #67741 (auto_prepend_file messes up __LINE__).
(Reeze Xia)

cURL :

- Fixed bug #69088 (PHP_MINIT_FUNCTION does not fully initialize cURL on Win32). (Grant Pannell)

- Add CURLPROXY_SOCKS4A and CURLPROXY_SOCKS5_HOSTNAME constants if supported by libcurl. (Linus Unneback)

Ereg :

- Fixed bug #69248 (heap overflow vulnerability in regcomp.c) (CVE-2015-2305). (Stas)


- Fixed bug #68822 (request time is reset too early).
(honghu069 at 163 dot com)


- Fixed bug #68964 (Allowed memory size exhausted with odbc_exec). (Anatol)

Opcache :

- Fixed bug #69159 (Opcache causes problem when passing a variable variable to a function). (Dmitry, Laruence)

- Fixed bug #69125 (Array numeric string as key).

- Fixed bug #69038 (switch(SOMECONSTANT) misbehaves).

OpenSSL :

- Fixed bug #68912 (Segmentation fault at openssl_spki_new). (Laruence)

- Fixed bug #61285, #68329, #68046, #41631 (encrypted streams don't observe socket timeouts). (Brad Broerman)

- Fixed bug #68920 (use strict peer_fingerprint input checks) (Daniel Lowrey)

- Fixed bug #68879 (IP Address fields in subjectAltNames not used) (Daniel Lowrey)

- Fixed bug #68265 (SAN match fails with trailing DNS dot) (Daniel Lowrey)

- Fixed bug #67403 (Add signatureType to openssl_x509_parse) (Daniel Lowrey)

- Fixed bug (#69195 Inconsistent stream crypto values across versions) (Daniel Lowrey)

pgsql :

- Fixed bug #68638 (pg_update() fails to store infinite values). (william dot welter at 4linux dot com dot br, Laruence)

Readline :

- Fixed bug #69054 (Null dereference in readline_(read|write)_history() without parameters).


- Fixed bug #69085 (SoapClient's __call() type confusion through unserialize()). (andrea dot palazzo at truel dot it, Laruence)


- Fixed bug #69108 ('Segmentation fault' when (de)serializing SplObjectStorage). (Laruence)

- Fixed bug #68557 (RecursiveDirectoryIterator::seek(0) broken after calling getChildren()). (Julien)


- Fixed bug #69253 (ZIP Integer Overflow leads to writing past heap boundary) (CVE-2015-2331). (Stas)

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected php package.

See Also



Plugin Details

Severity: Medium

ID: 82435

File Name: fedora_2015-4236.nasl

Version: 1.6

Type: local

Agent: unix

Published: 3/31/2015

Updated: 1/11/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.4

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:php, cpe:/o:fedoraproject:fedora:21

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/21/2015

Vulnerability Publication Date: 3/21/2015

Reference Information

BID: 72539

FEDORA: 2015-4236