[SECURITY] Fedora 19 Update: php-5.5.3-1.fc19

updates at fedoraproject.org updates at fedoraproject.org
Sat Aug 24 00:05:41 UTC 2013

Fedora Update Notification
2013-08-19 20:21:29

Name        : php
Product     : Fedora 19
Version     : 5.5.3
Release     : 1.fc19
URL         : http://www.php.net/
Summary     : PHP scripting language for creating dynamic web sites
Description :
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

The php package contains the module (often referred to as mod_php)
which adds support for the PHP language to Apache HTTP Server.

Update Information:

Version 5.5.3, 22 Aug 2013

+ Fixed UMR in fix for CVE-2013-4248.

Version 5.5.2, 15-Aug-2013

* Fixed bug #65372 (Segfault in gc_zval_possible_root when return reference fails).
* Fixed value of FILTER_SANITIZE_FULL_SPECIAL_CHARS constant (previously was erroneously set to FILTER_SANITIZE_SPECIAL_CHARS value).
* Fixed bug #65304 (Use of max int in array_sum).
* Fixed bug #65291 (get_defined_constants() causes PHP to crash in a very limited case).
* Fixed bug #62691 (solaris sed has no -i switch).
* Fixed bug #61345 (CGI mode - make install don't work).
* Fixed bug #61268 (--enable-dtrace leads make to clobber Zend/zend_dtrace.d).

* Added flags option to DOMDocument::schemaValidate() and DOMDocument::schemaValidateSource(). Added LIBXML_SCHEMA_CREATE flag.

* Added opcache.restrict_api configuration directive that may limit usage of OPcahce API functions only to patricular script(s).
* Added support for glob symbols in blacklist entries (?, *, **).
* Fixed bug #65338 (Enabling both php_opcache and php_wincache AVs on shutdown).

* Fixed handling null bytes in subjectAltName (CVE-2013-4248).

* Fixed bug #65299 (pdo mysql parsing errors).

* Fixed bug #65028 (Phar::buildFromDirectory creates corrupt archives for some specific contents).

* Fixed bug #62978 (Disallow possible SQL injections with pg_select()/pg_update() /pg_delete()/pg_insert()).
* Fixed bug #65336 (pg_escape_literal/identifier() silently returns false).

* Implemented strict sessions RFC (https://wiki.php.net/rfc/strict_sessions) which protects against session fixation attacks and session collisions (CVE-2011-4718).
* Fixed possible buffer overflow under Windows. Note: Not a security fix.
* Changed session.auto_start to PHP_INI_PERDIR.

* Fixed bug #65018 (SoapHeader problems with SoapServer).

* Fixed bug #65328 (Segfault when getting SplStack object Value).
* Added RecursiveTreeIterator setPostfix and getPostifx methods.
* Fixed bug #61697 (spl_autoload_functions returns lambda functions incorrectly).

* Fixed bug #65268 (select() implementation uses outdated tick API).


* Wed Aug 21 2013 Remi Collet <rcollet at redhat.com> - 5.5.3-1
- update to 5.5.3
* Mon Aug 19 2013 Remi Collet <rcollet at redhat.com> - 5.5.2-1
- update to 5.5.2, fixes for CVE-2011-4718 + CVE-2013-4248
- improve system libzip patch
* Mon Jul 22 2013 Remi Collet <rcollet at redhat.com> - 5.5.1-1
- update to 5.5.1
- add Provides: php(pdo-abi), for consistency with php(api)
  and php(zend-abi)
- improved description for mod_php
- fix opcache ZTS configuration (blacklists in /etc/php-zts.d)
- add missing man pages (phar, php-cgi)
* Fri Jul 12 2013 Remi Collet <rcollet at redhat.com> - 5.5.0-2
- add security fix for CVE-2013-4113
- add missing ASL 1.0 license
- 32k stack size seems ok for tests on both 32/64bits build
* Thu Jun 20 2013 Remi Collet <rcollet at redhat.com> 5.5.0-1
- update to 5.5.0 final
* Fri Jun 14 2013 Remi Collet <rcollet at redhat.com> 5.5.0-0.11.RC3
- also drop JSON from sources
- clean conditional for JSON (as removed from the sources)
- clean conditional for FPM (always build)

  [ 1 ] Bug #996774 - CVE-2011-4718 php: session fixation vulnerability allows remote hijacking of sessions
  [ 2 ] Bug #997097 - CVE-2013-4248 php: hostname check bypassing vulnerability in SSL client

This update can be installed with the "yum" update program.  Use 
su -c 'yum update php' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at

More information about the package-announce mailing list