|
|
Subscribe / Log in / New account

Mageia alert MGASA-2014-0542 (php)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2014-0542: Updated php packages fix CVE-2014-8412
Date:  Sun, 21 Dec 2014 21:47:51 +0100
Message-ID:  <20141221204751.BB02641107@valstar.mageia.org>

MGASA-2014-0542 - Updated php packages fix CVE-2014-8412 Publication date: 21 Dec 2014 URL: http://advisories.mageia.org/MGASA-2014-0542.html Type: security Affected Mageia releases: 4 CVE: CVE-2014-8412 Description: Updated php packages fix security vulnerability: A use-after-free flaw was found in PHP unserialize(). An untrusted input could cause PHP interpreter to crash or, possibly, execute arbitrary code when processed using unserialize() (CVE-2014-8412). PHP has been updated to version 5.5.20, which fixes these issues and other bugs. References: - https://bugs.mageia.org/show_bug.cgi?id=14848 - http://www.php.net/ChangeLog-5.php#5.5.20 - https://bugzilla.redhat.com/show_bug.cgi?id=1175718 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8412 SRPMS: - 4/core/php-5.5.20-1.mga4 - 4/core/php-apc-3.1.15-4.10.mga4


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds