Bug 1194730 (CVE-2015-0273)
Summary: | CVE-2015-0273 php: use after free vulnerability in unserialize() with DateTimeZone | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | angelo.alvarez, bgollahe, bleanhar, bressers, carnil, ccoleman, cgr, dmcphers, fedora, jdetiber, jialiu, jkeck, jokerman, jorton, kanderso, kseifried, lmeyer, mdshaikh, michele, mmaslano, mmccomas, mmilgram, pasi.koistinen, rcollet, sreber, webstack-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | php 5.4.38, php 5.5.22, php 5.6.6 | Doc Type: | Bug Fix |
Doc Text: |
A use-after-free flaw was found in the unserialize() function of PHP's DateTimeZone implementation. A malicious script author could possibly use this flaw to disclose certain portions of server memory.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-07-09 21:45:09 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1204762, 1204763, 1204765, 1204766, 1209880, 1209884, 1209887 | ||
Bug Blocks: | 1194715, 1210213 |
Description
Vasyl Kaigorodov
2015-02-20 16:03:55 UTC
Statement: This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable code. Could you please confirm that Red Hat Enterprise Linux 6 is not affected? Can someone at Red Hat take the initiative and update the CVE page?? https://access.redhat.com/security/cve/CVE-2015-0273 Customers shouldn't have to crawl through bugzilla to find out if our platforms are vulnerable. Also the statement should include PHP and PHP53 applicabililty of the CVE. Fixed upstream in PHP 5.6.6, 5.5.22, and 5.4.38: http://php.net/ChangeLog-5.php#5.6.6 http://php.net/ChangeLog-5.php#5.5.22 http://php.net/ChangeLog-5.php#5.4.38 PHP 5.4 commit : http://git.php.net/?p=php-src.git;a=commit;h=7b1898183032eeabc64a086ff040af991cebcd93 It is not clear from the CVE notice (https://access.redhat.com/security/cve/CVE-2015-0273) nor from this Bugzilla entry whether or not RHEL 7.1 or RHEL 6.6 are vulnerable. RHEL 6.6: php-5.3.3 RHEL 7.1: php-5.4.16 Please clarify. Thanks! This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUS Via RHSA-2015:1066 https://rhn.redhat.com/errata/RHSA-2015-1066.html This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUS Via RHSA-2015:1053 https://rhn.redhat.com/errata/RHSA-2015-1053.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1135 https://rhn.redhat.com/errata/RHSA-2015-1135.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:1218 https://rhn.redhat.com/errata/RHSA-2015-1218.html |