VAR-201311-0379
Vulnerability from variot - Updated: 2026-03-09 20:03The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification. PHP is prone to a denial-of-service vulnerability due to a heap-based buffer over-read error. Successful exploits will allow attackers to cause a denial of service condition. Due to the nature of this issue, arbitrary code execution may be possible; this has not been confirmed. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. There is a security vulnerability in the 'scan' function in the ext/date/lib/parse_iso_intervals.c file in PHP 5.5.6 and earlier versions. The vulnerability is caused by the program not properly restricting the creation of DateInterval objects. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201408-11
http://security.gentoo.org/
Severity: High Title: PHP: Multiple vulnerabilities Date: August 29, 2014 Bugs: #459904, #472204, #472558, #474656, #476570, #481004, #483212, #485252, #492784, #493982, #501312, #503630, #503670, #505172, #505712, #509132, #512288, #512492, #513032, #516994, #519932, #520134, #520438 ID: 201408-11
Synopsis
Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to remote execution of arbitrary code.
Background
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/php < 5.5.16 >= 5.5.16 >= 5.4.32 >= 5.3.29
Description
Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details.
Impact
A context-dependent attacker can cause arbitrary code execution, create a Denial of Service condition, read or write arbitrary files, impersonate other servers, hijack a web session, or have other unspecified impact. Additionally, a local attacker could gain escalated privileges.
Workaround
There is no known workaround at this time.
Resolution
All PHP 5.5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.5.16"
All PHP 5.4 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.4.32"
All PHP 5.3 users should upgrade to the latest version. This release marks the end of life of the PHP 5.3 series. Future releases of this series are not planned. All PHP 5.3 users are encouraged to upgrade to the current stable version of PHP 5.5 or previous stable version of PHP 5.4, which are supported till at least 2016 and 2015 respectively.
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.3.29"
References
[ 1 ] CVE-2011-4718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718 [ 2 ] CVE-2013-1635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635 [ 3 ] CVE-2013-1643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643 [ 4 ] CVE-2013-1824 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824 [ 5 ] CVE-2013-2110 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110 [ 6 ] CVE-2013-3735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735 [ 7 ] CVE-2013-4113 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113 [ 8 ] CVE-2013-4248 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248 [ 9 ] CVE-2013-4635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635 [ 10 ] CVE-2013-4636 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636 [ 11 ] CVE-2013-6420 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420 [ 12 ] CVE-2013-6712 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712 [ 13 ] CVE-2013-7226 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226 [ 14 ] CVE-2013-7327 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327 [ 15 ] CVE-2013-7345 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345 [ 16 ] CVE-2014-0185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185 [ 17 ] CVE-2014-0237 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237 [ 18 ] CVE-2014-0238 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238 [ 19 ] CVE-2014-1943 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943 [ 20 ] CVE-2014-2270 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270 [ 21 ] CVE-2014-2497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497 [ 22 ] CVE-2014-3597 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597 [ 23 ] CVE-2014-3981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981 [ 24 ] CVE-2014-4049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049 [ 25 ] CVE-2014-4670 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670 [ 26 ] CVE-2014-5120 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201408-11.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
Additionally, the PECL packages which requires so has been rebuilt for php-5.5.8 and some has been upgraded to their latest versions.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712 http://www.php.net/ChangeLog-5.php#5.5.8
Updated Packages:
Mandriva Business Server 1/X86_64: 6cbe3c3e54feb911f830a84798cba59b mbs1/x86_64/apache-mod_php-5.5.8-1.mbs1.x86_64.rpm a10aeb6dd4d85ab4c45b7acb3a080bf1 mbs1/x86_64/lib64json2-0.11-1.mbs1.x86_64.rpm e661a00b2ea0b360f73c32c633a5665b mbs1/x86_64/lib64json-devel-0.11-1.mbs1.x86_64.rpm b7938d352e62b7679b55c874e06fbe33 mbs1/x86_64/lib64mbfl1-1.2.0-1.mbs1.x86_64.rpm 9b84b48d9b2a18e048e1c40c786fc3d5 mbs1/x86_64/lib64mbfl-devel-1.2.0-1.mbs1.x86_64.rpm 7d4766a2eb0dd7048917eec2e1f9461f mbs1/x86_64/lib64php5_common5-5.5.8-1.mbs1.x86_64.rpm a6a17628ec5c2528b42d0308b44b8602 mbs1/x86_64/php-amf-0.9.2-10.1.mbs1.x86_64.rpm f47775a96d510872e93af788c942eb0d mbs1/x86_64/php-apacheaccessor-1.0.1-1.mbs1.x86_64.rpm 61c55f41ddc362a27b0d622fd72f832b mbs1/x86_64/php-apc-3.1.15-1.2.mbs1.x86_64.rpm 23e851dddb7a7e036eab0bbe753d22fc mbs1/x86_64/php-apc-admin-3.1.15-1.2.mbs1.x86_64.rpm 59f6774136e76c82ea13566c73ff5579 mbs1/x86_64/php-apm-1.1.0-1RC2.mbs1.x86_64.rpm 41f2071c87dc54edd1b35eb3b050523d mbs1/x86_64/php-archive-0.2-22.1.mbs1.x86_64.rpm 6eea5350fd29e56ab3c6530fd4a8eb2d mbs1/x86_64/php-auth_nds-2.2.6-28.1.mbs1.x86_64.rpm 09769fd2f27af4498679488463d4f0d0 mbs1/x86_64/php-bbcode-1.0.3-0.0.b1.5.mbs1.x86_64.rpm 046aade243a8dfbb4ae5235333404450 mbs1/x86_64/php-bcmath-5.5.8-1.mbs1.x86_64.rpm d41522e2a71180202c9ea965ab8bb87d mbs1/x86_64/php-bcompiler-1.0.2-3.1.mbs1.x86_64.rpm 22108d55173d81e808601cac8da19528 mbs1/x86_64/php-bitset-2.0-1.mbs1.x86_64.rpm 60a5774e783dc9410a3abecd25567242 mbs1/x86_64/php-bloomy-0.1.0-11.1.mbs1.x86_64.rpm bf678b9a204be1b978643122de681fa8 mbs1/x86_64/php-braille-0.1.1-1.mbs1.x86_64.rpm bb70b7e885f18b80db1ee6738ce3be50 mbs1/x86_64/php-bz2-5.5.8-1.mbs1.x86_64.rpm 6d44169948606477f69f70f7ad578f53 mbs1/x86_64/php-cairo-0.3.2-1.mbs1.x86_64.rpm 163f88e5a8527945410c21717dc0c523 mbs1/x86_64/php-cairo_wrapper-0.2.4-12.1.mbs1.x86_64.rpm bbfb9602746185c2ccee545bda5cea1b mbs1/x86_64/php-calendar-5.5.8-1.mbs1.x86_64.rpm 6cd3f73d40196e91b3d5b0d115fd2781 mbs1/x86_64/php-cgi-5.5.8-1.mbs1.x86_64.rpm 303f2b6bd21379576c64e9babe78b5a4 mbs1/x86_64/php-cli-5.5.8-1.mbs1.x86_64.rpm 1b986fc42ec86b34203557515332cbcb mbs1/x86_64/php-courierauth-0.1.0-26.1.mbs1.x86_64.rpm a451399cac0d1eb96c02b82c3682bacb mbs1/x86_64/php-ctype-5.5.8-1.mbs1.x86_64.rpm fff5e8e41e8d91ba8f45dc2c2e09de3e mbs1/x86_64/php-curl-5.5.8-1.mbs1.x86_64.rpm 9d8d29b7e05ecdb5b209c5f3e9ea11ef mbs1/x86_64/php-cyrus-1.0-30.1.mbs1.x86_64.rpm be02c96797fe3505035103a28a646650 mbs1/x86_64/php-dav-1.2-4.1.mbs1.x86_64.rpm b1d13d3740cd6d6c80b4ea9f6deccb1f mbs1/x86_64/php-dba-5.5.8-1.mbs1.x86_64.rpm 0c1f23ac85aa3da6731cb50877f4933e mbs1/x86_64/php-dbase-5.0.1-3.1.mbs1.x86_64.rpm 90a56987be11920d4bd5e435e92dd07e mbs1/x86_64/php-dbx-1.1.2-3.1.mbs1.x86_64.rpm f2924a0354eb16c217b5f7ae073df1e7 mbs1/x86_64/php-devel-5.5.8-1.mbs1.x86_64.rpm 92a8332882a805d53823f0c950de0d95 mbs1/x86_64/php-dio-0.0.7-1.mbs1.x86_64.rpm 18e14cc713ce4e782d3378a6b50739d7 mbs1/x86_64/php-doc-5.5.8-1.mbs1.noarch.rpm 19fe234353968902a9095dac4fd4914b mbs1/x86_64/php-dom-5.5.8-1.mbs1.x86_64.rpm 3f86006633057b7819cb7ff0109d8bc3 mbs1/x86_64/php-doublemetaphone-1.0.0-1.mbs1.x86_64.rpm 1c9d18a83bb590cc398de98529619fbe mbs1/x86_64/php-drizzle-0.4.2-8.1.mbs1.x86_64.rpm 681f9d0f04e86b10bcdab85e8ab46646 mbs1/x86_64/php-enchant-5.5.8-1.mbs1.x86_64.rpm 86a0fd5715e93fe2ad3af8af9c762f5e mbs1/x86_64/php-event-1.8.1-1.mbs1.x86_64.rpm e885e3a1aa38a84f3a91a2f3adfdd9ed mbs1/x86_64/php-exif-5.5.8-1.mbs1.x86_64.rpm 28cbec3693e2ec299ae14f4d3aee2bab mbs1/x86_64/php-expect-0.3.1-3.1.mbs1.x86_64.rpm 1f6e495022af41702d958c5e4c5a7a0c mbs1/x86_64/php-fam-5.0.1-21.1.mbs1.x86_64.rpm dcc659581a3370b6152a0be1c3d4330a mbs1/x86_64/php-fileinfo-5.5.8-1.mbs1.x86_64.rpm 51361ea120255c19051acce2f7c52373 mbs1/x86_64/php-filepro-5.1.6-31.1.mbs1.x86_64.rpm 57ffefd27baab8189b77ec065f6c25fb mbs1/x86_64/php-filter-5.5.8-1.mbs1.x86_64.rpm 40ef3b1acf64c3dbbec30ed053faf91d mbs1/x86_64/php-fpm-5.5.8-1.mbs1.x86_64.rpm 585a27ca37d6e425e33ebffda8d4a3c5 mbs1/x86_64/php-ftp-5.5.8-1.mbs1.x86_64.rpm f7e17547d06d727435d842566711bd1f mbs1/x86_64/php-gd-5.5.8-1.mbs1.x86_64.rpm 424413861017a0d960ec25799f7e6d96 mbs1/x86_64/php-gender-1.0.0-1.mbs1.x86_64.rpm 326ce65eb182fa95338b4950bf2902d8 mbs1/x86_64/php-geoip-1.0.8-3.1.mbs1.x86_64.rpm e8e5d68ccd220fa1411538c887a9b033 mbs1/x86_64/php-gettext-5.5.8-1.mbs1.x86_64.rpm e52ebf9fbb468cc480ff89b16746ac32 mbs1/x86_64/php-gmp-5.5.8-1.mbs1.x86_64.rpm 705599e093ed673401b92dcc55d7f7af mbs1/x86_64/php-gnupg-1.3.2-8.1.mbs1.x86_64.rpm e3acb8961bcb47b82eae4f2d1f0a5533 mbs1/x86_64/php-gnutls-0.3-0.rc1.25.mbs1.x86_64.rpm 63cace0435e5165bb99868f0b77fd0fb mbs1/x86_64/php-gtk2-2.0.3-0.git20130225.1.1.mbs1.x86_64.rpm d24ba27252b2d03b1ac45de414ace8f4 mbs1/x86_64/php-haru-1.0.4-1.mbs1.x86_64.rpm 69dcad6cd94a553145fc7170eb92b9ab mbs1/x86_64/php-hash-5.5.8-1.mbs1.x86_64.rpm 011ee7e7c17f420f6fdddb73f07e2689 mbs1/x86_64/php-hidef-0.1.13-1.mbs1.x86_64.rpm 5be11ca2acde72985150182165690a1e mbs1/x86_64/php-htscanner-1.0.1-1.mbs1.x86_64.rpm 1ef360e88e9e53f426b6128b352d4498 mbs1/x86_64/php-iconv-5.5.8-1.mbs1.x86_64.rpm 241adb52708e8152bbd264477d2c6685 mbs1/x86_64/php-id3-0.2-33.1.mbs1.x86_64.rpm 18a9444caba90afd57ac9d349de79592 mbs1/x86_64/php-imagick-3.1.2-1.mbs1.x86_64.rpm fb435f0e0c06838e6ba4b8e55edb65da mbs1/x86_64/php-imap-5.5.8-1.mbs1.x86_64.rpm e3d4b8b1a34ee2fff2514799d39d6c83 mbs1/x86_64/php-inclued-0.1.3-1.mbs1.x86_64.rpm 9a62365f025a6cd92a5649800f94e392 mbs1/x86_64/php-ini-5.5.8-1.mbs1.x86_64.rpm cc0fa3dfabc021d0a6f97de624c72451 mbs1/x86_64/php-inotify-0.1.6-1.mbs1.x86_64.rpm f7c954f5f7a8c3497244dab0ac9cc874 mbs1/x86_64/php-intl-5.5.8-1.mbs1.x86_64.rpm 72104e0ea01d0b8d7025ae3de961d950 mbs1/x86_64/php-json-5.5.8-1.mbs1.x86_64.rpm 788d244d7832eca94dc694ec2642c24b mbs1/x86_64/php-ldap-5.5.8-1.mbs1.x86_64.rpm ef1754adb00601ab1c4c29bb1fd1ef59 mbs1/x86_64/php-libevent-0.1.0-1.mbs1.x86_64.rpm b300a580ba667f6898875fc41d19116f mbs1/x86_64/php-mbstring-5.5.8-1.mbs1.x86_64.rpm bb5fecd25651248b7d4731b1aea2b31e mbs1/x86_64/php-mcrypt-5.5.8-1.mbs1.x86_64.rpm 299d7d44e160c8b4e5b7f30644c65a67 mbs1/x86_64/php-mcve-7.0.3-11.1.mbs1.x86_64.rpm db5be0ea33960859e4f31dc1d8e6c5af mbs1/x86_64/php-memcache-3.0.8-1.mbs1.x86_64.rpm bc238ba372583c19c57f658ff4225518 mbs1/x86_64/php-memcached-2.1.0-1.mbs1.x86_64.rpm fbd5ebb29764a11aa742e77fde63ec03 mbs1/x86_64/php-mnogosearch-1.96-35.1.mbs1.x86_64.rpm 2c0d85ca48d9b1f22f0f8445364f97e5 mbs1/x86_64/php-mongo-1.4.5-1.mbs1.x86_64.rpm a87d1de22d52d2e51bb3977a87afb715 mbs1/x86_64/php-mssql-5.5.8-1.mbs1.x86_64.rpm c2c1b538550758102b8b456a0db9c18f mbs1/x86_64/php-mysql-5.5.8-1.mbs1.x86_64.rpm c09aef537da221b4eebbaad7a893e195 mbs1/x86_64/php-mysqli-5.5.8-1.mbs1.x86_64.rpm f50cb148d81ecf786c80661e19714893 mbs1/x86_64/php-mysqlnd-5.5.8-1.mbs1.x86_64.rpm 25ca5ff7bb6a4bb39e17bef527a4daec mbs1/x86_64/php-newt-1.2.8-1.mbs1.x86_64.rpm 823b8d9b36c8b34b5f80f3f478d5be7d mbs1/x86_64/php-odbc-5.5.8-1.mbs1.x86_64.rpm 821f30096996e971be059dcc617beeb4 mbs1/x86_64/php-oggvorbis-0.2-33.1.mbs1.x86_64.rpm ec2c830033979609b85d19722079ad45 mbs1/x86_64/php-opcache-5.5.8-1.mbs1.x86_64.rpm 0e66afe941f83d77128a0326fea38368 mbs1/x86_64/php-openssl-5.5.8-1.mbs1.x86_64.rpm e8b0808df1e75e9eee987d1c38d0de41 mbs1/x86_64/php-pam-1.0.3-10.1.mbs1.x86_64.rpm c9772947df6039925dc89ed495c5eea0 mbs1/x86_64/php-pcntl-5.5.8-1.mbs1.x86_64.rpm 2d6f78b753dce6b022f0f495e5894bfe mbs1/x86_64/php-pdo-5.5.8-1.mbs1.x86_64.rpm 27dd4d459d9c50a3fa5ee81d988e6c4e mbs1/x86_64/php-pdo_dblib-5.5.8-1.mbs1.x86_64.rpm 060ad327a9a83ef417f9b0bdd60b7529 mbs1/x86_64/php-pdo_mysql-5.5.8-1.mbs1.x86_64.rpm f42d6c75dcd550e902bdda0672407f17 mbs1/x86_64/php-pdo_odbc-5.5.8-1.mbs1.x86_64.rpm 0e3764c821f508322e40a779a6694d36 mbs1/x86_64/php-pdo_pgsql-5.5.8-1.mbs1.x86_64.rpm af7cc29beea4f7a1aa87f81cc0f42e4d mbs1/x86_64/php-pdo_sqlite-5.5.8-1.mbs1.x86_64.rpm 6dc688c04f4a9617f5d9f179d5bffad3 mbs1/x86_64/php-pgsql-5.5.8-1.mbs1.x86_64.rpm e9e88947d413f78a0de370b45cd1e581 mbs1/x86_64/php-phar-5.5.8-1.mbs1.x86_64.rpm c4cbe315a3897b156de8d8b1ebee2454 mbs1/x86_64/php-posix-5.5.8-1.mbs1.x86_64.rpm a22a1d86311d97a6e74f41d4c5cee58a mbs1/x86_64/php-proctitle-0.1.2-1.mbs1.x86_64.rpm 1a642e05f7e4acbc0574700d39277f68 mbs1/x86_64/php-radius-1.2.7-1.1.mbs1.x86_64.rpm 364d5f30ed13942441cc6728af41f3ce mbs1/x86_64/php-readline-5.5.8-1.mbs1.x86_64.rpm 8e09378518bf4efca20b146d2ad3ae18 mbs1/x86_64/php-recode-5.5.8-1.mbs1.x86_64.rpm aca1fc497f23bebd1b261a91b4453c83 mbs1/x86_64/php-rrdtool-0-35.1.mbs1.x86_64.rpm b7ff902ed02d70049b9fdfa86c82c2bd mbs1/x86_64/php-sasl-0.1.0-36.1.mbs1.x86_64.rpm f28d198a8148aa993accca677f3921ce mbs1/x86_64/php-session-5.5.8-1.mbs1.x86_64.rpm 9ac8db465023197ca4a3f3358865d6c4 mbs1/x86_64/php-shmop-5.5.8-1.mbs1.x86_64.rpm 994c1f4ef6fdbb46a1217a0b4679b540 mbs1/x86_64/php-snmp-5.5.8-1.mbs1.x86_64.rpm 122de98493f51dad25fad1bd6490b14d mbs1/x86_64/php-soap-5.5.8-1.mbs1.x86_64.rpm 26cb96e64938013375ff2720787dbce3 mbs1/x86_64/php-sockets-5.5.8-1.mbs1.x86_64.rpm c03f6d3524750a11a26984a5680b6e31 mbs1/x86_64/php-sqlite-1.0.3-1.mbs1.x86_64.rpm cf9b1e1845c4df39e65c721b5ebe1ecd mbs1/x86_64/php-sqlite3-5.5.8-1.mbs1.x86_64.rpm 3692df1b43da42070fb2245ba85736d7 mbs1/x86_64/php-ssh2-0.12-1.mbs1.x86_64.rpm 46b107eaf4753b6f3e5b1d1c01014ac4 mbs1/x86_64/php-suhosin-0.9.33-7.2.mbs1.x86_64.rpm 648fa01ef7b191c206881bc81fc91cae mbs1/x86_64/php-svn-1.0.2-1.mbs1.x86_64.rpm 4f76f8fdc2c3b96130b50693f44fb82d mbs1/x86_64/php-swish-0.5.0-1.mbs1.x86_64.rpm dcda9398908f302d916e16ac23edc864 mbs1/x86_64/php-sybase_ct-5.5.8-1.mbs1.x86_64.rpm 05c262004a13838b354818605091d375 mbs1/x86_64/php-syck-0.9.3-17.1.mbs1.x86_64.rpm 911002b84d2ccf6632ab78148eeaa836 mbs1/x86_64/php-sysvmsg-5.5.8-1.mbs1.x86_64.rpm 64ee1ae53811450f47ced3dfc180cd3b mbs1/x86_64/php-sysvsem-5.5.8-1.mbs1.x86_64.rpm 8822eff6601523af2aec8a4b40278d5c mbs1/x86_64/php-sysvshm-5.5.8-1.mbs1.x86_64.rpm cb7122e7b2b81860304578978b20fae4 mbs1/x86_64/php-tcpwrap-1.1.3-18.1.mbs1.x86_64.rpm dd20d26681b253ca10d226b576cd9da7 mbs1/x86_64/php-tdb-1.0.0-18.1.mbs1.x86_64.rpm 89ca00e2d6b8a0655161caf3d975a29c mbs1/x86_64/php-tidy-5.5.8-1.mbs1.x86_64.rpm 63e583090b7d6e86679d9cf4dadd13b8 mbs1/x86_64/php-timezonedb-2013.9-1.1.mbs1.x86_64.rpm 51abf076f5d22b0393f94d74bf384502 mbs1/x86_64/php-tk-0.1.1-29.1.mbs1.x86_64.rpm a2a8c303e251afdfd6b6eb84307f95cd mbs1/x86_64/php-tokenizer-5.5.8-1.mbs1.x86_64.rpm 2d6a9a2ee9034ca19c81914f10dbaaf1 mbs1/x86_64/php-txforward-1.0.7-3.1.mbs1.x86_64.rpm a91cc0a9f98d6be93242c761722c3363 mbs1/x86_64/php-uploadprogress-1.0.3.1-3.1.mbs1.x86_64.rpm 4cad056354849adc02de0899481f2c0e mbs1/x86_64/php-uuid-1.0.3-1.mbs1.x86_64.rpm 269b8bdd1a21e7f7688a60cb6d4e66c9 mbs1/x86_64/php-wbxml-1.0.3-14.1.mbs1.x86_64.rpm 3c324e3865d37e40e0c44d703e6af971 mbs1/x86_64/php-wddx-5.5.8-1.mbs1.x86_64.rpm 272928a998127f03fa7b466bdae5625b mbs1/x86_64/php-xattr-1.2.0-1.mbs1.x86_64.rpm 1a36dc739e5b59e1a7234c20252bb30c mbs1/x86_64/php-xdiff-1.5.2-1.mbs1.x86_64.rpm e21b93c47fc09d426b1e9873d922c9b6 mbs1/x86_64/php-xml-5.5.8-1.mbs1.x86_64.rpm 18b1f4b35359ef4803840b6a59023662 mbs1/x86_64/php-xmlreader-5.5.8-1.mbs1.x86_64.rpm 32cac8722f385bd6c889c7998708f896 mbs1/x86_64/php-xmlrpc-5.5.8-1.mbs1.x86_64.rpm 17741808a8ab423b918e15d791a470a0 mbs1/x86_64/php-xmlwriter-5.5.8-1.mbs1.x86_64.rpm c4ca4a667ea3d67c2a5f41be43e275ef mbs1/x86_64/php-xsl-5.5.8-1.mbs1.x86_64.rpm 26c7a4cb6e3a349f184cb151b3e66bbe mbs1/x86_64/php-xslcache-0.7.2-1.mbs1.x86_64.rpm 2ec0a54234ba1f9408a1dfc312ce15bb mbs1/x86_64/php-yaml-1.1.1-1.mbs1.x86_64.rpm d8d867f694f761e0c1fbb42f37671246 mbs1/x86_64/php-yaz-1.1.6-1.mbs1.x86_64.rpm d3a22538565c0e70823ab006a918b599 mbs1/x86_64/php-yp-5.2.3-25.1.mbs1.x86_64.rpm e8a6f6b750a57d30cab05f43ed0d2826 mbs1/x86_64/php-zip-5.5.8-1.mbs1.x86_64.rpm 85fc2115c2d73651c13b7e7d579035c2 mbs1/x86_64/php-zlib-5.5.8-1.mbs1.x86_64.rpm dffedeb2bc9dbcf09a08c5b8ee085241 mbs1/SRPMS/json-c-0.11-1.mbs1.src.rpm af6e8a771ad6e82cc4890d017a282a54 mbs1/SRPMS/libmbfl-1.2.0-1.mbs1.src.rpm 208cadf784cf7e5d87473a66b1ad9dec mbs1/SRPMS/php-5.5.8-1.mbs1.src.rpm 569fe67ccfe844b44d66cd5801c87029 mbs1/SRPMS/php-amf-0.9.2-10.1.mbs1.src.rpm 18c40965301ed883fdc24604257cd1e5 mbs1/SRPMS/php-apacheaccessor-1.0.1-1.mbs1.src.rpm f7450092f00a1271e4c767317739caf9 mbs1/SRPMS/php-apc-3.1.15-1.2.mbs1.src.rpm 05ac57db5fca564a1056dfbaffb98a5e mbs1/SRPMS/php-apm-1.1.0-1RC2.mbs1.src.rpm 92d6548693ee63aa19a50bf8662db4b1 mbs1/SRPMS/php-archive-0.2-22.1.mbs1.src.rpm 937fe1748c3a85337d74d9d25a5f64b2 mbs1/SRPMS/php-auth_nds-2.2.6-28.1.mbs1.src.rpm 73b13a0ed1ef4c11411c8482d924346a mbs1/SRPMS/php-bbcode-1.0.3-0.0.b1.5.mbs1.src.rpm 2e6d69003f3b782b4dd304a7fb7838d6 mbs1/SRPMS/php-bcompiler-1.0.2-3.1.mbs1.src.rpm 0514e5ace4b598d1f2f380eee232d906 mbs1/SRPMS/php-bitset-2.0-1.mbs1.src.rpm f681295764f84a253a17a6f8f0de66f3 mbs1/SRPMS/php-bloomy-0.1.0-11.1.mbs1.src.rpm f099bc978799afff5ed4ab35cde70633 mbs1/SRPMS/php-braille-0.1.1-1.mbs1.src.rpm 522cd2c8a16f78acdc7dc5f80fff34e4 mbs1/SRPMS/php-cairo-0.3.2-1.mbs1.src.rpm 56436636c2f04d70a96d6cb571abcf03 mbs1/SRPMS/php-cairo_wrapper-0.2.4-12.1.mbs1.src.rpm 16e205bc0339a90acb9560df409be2f7 mbs1/SRPMS/php-courierauth-0.1.0-26.1.mbs1.src.rpm fc4f8967c11cc4b2080193ea11439f10 mbs1/SRPMS/php-cyrus-1.0-30.1.mbs1.src.rpm 028cd11a27d1caf3fa0bfb7ccba72dff mbs1/SRPMS/php-dav-1.2-4.1.mbs1.src.rpm 6e7fa7b114c2262288d12b16b67f9398 mbs1/SRPMS/php-dbase-5.0.1-3.1.mbs1.src.rpm f5a32e8c86e6d8a37ea49f6edcc8f2eb mbs1/SRPMS/php-dbx-1.1.2-3.1.mbs1.src.rpm 28361b8014ef86de714370ed2f9c8523 mbs1/SRPMS/php-dio-0.0.7-1.mbs1.src.rpm 46cd6b2052a284a5e4b6cd2e9ce0f35b mbs1/SRPMS/php-doublemetaphone-1.0.0-1.mbs1.src.rpm 216f54099506165d92e2fa5eb5fa895b mbs1/SRPMS/php-drizzle-0.4.2-8.1.mbs1.src.rpm 8103618186a8263b5aa140ac2604a377 mbs1/SRPMS/php-event-1.8.1-1.mbs1.src.rpm 117870df2707a9f7f743e0d5e006f01c mbs1/SRPMS/php-expect-0.3.1-3.1.mbs1.src.rpm 1e9571e84f5c216436346ba4f0ef7e01 mbs1/SRPMS/php-fam-5.0.1-21.1.mbs1.src.rpm 12ab1fab99d150362d41a2462432616f mbs1/SRPMS/php-filepro-5.1.6-31.1.mbs1.src.rpm b8f3eeac43f32ffab74d3a6a2e1a95a9 mbs1/SRPMS/php-gender-1.0.0-1.mbs1.src.rpm f4b01e4ea76567f29b6302a94de0187e mbs1/SRPMS/php-geoip-1.0.8-3.1.mbs1.src.rpm ad38f3ef3e39a2cc1ff974fb6fee5f27 mbs1/SRPMS/php-gnupg-1.3.2-8.1.mbs1.src.rpm 7993893485eed60a687dd9072e58ceb7 mbs1/SRPMS/php-gnutls-0.3-0.rc1.25.mbs1.src.rpm 93667de0345b12d30fd9a90850ccfa64 mbs1/SRPMS/php-gtk2-2.0.3-0.git20130225.1.1.mbs1.src.rpm 05bf2145f513bfa34f36e60032d752c1 mbs1/SRPMS/php-haru-1.0.4-1.mbs1.src.rpm efc0bfbf4490ea6bf61464fcc397661e mbs1/SRPMS/php-hidef-0.1.13-1.mbs1.src.rpm 4c4dcf9335bab8530c2b5a8f5d07fdf5 mbs1/SRPMS/php-htscanner-1.0.1-1.mbs1.src.rpm 4d39a950797e8df46762c5c73e170179 mbs1/SRPMS/php-id3-0.2-33.1.mbs1.src.rpm 1a756001cd773cdc7ca5f797e7171660 mbs1/SRPMS/php-imagick-3.1.2-1.mbs1.src.rpm 7fd6af5d9de5290b131e9624ec67b6bc mbs1/SRPMS/php-inclued-0.1.3-1.mbs1.src.rpm 57ca03ec85af8be4d4db50843d7adeb4 mbs1/SRPMS/php-inotify-0.1.6-1.mbs1.src.rpm 58c4db8af664a6790e382575b8b39151 mbs1/SRPMS/php-libevent-0.1.0-1.mbs1.src.rpm fde733df58d1daf042d0948be090e961 mbs1/SRPMS/php-mcve-7.0.3-11.1.mbs1.src.rpm 9340b22c4c7b2c5071c197c8fe22aa02 mbs1/SRPMS/php-memcache-3.0.8-1.mbs1.src.rpm a9c5cbd1eeab91714ec8ce69106e1a20 mbs1/SRPMS/php-memcached-2.1.0-1.mbs1.src.rpm 6cd241db51c9f1e51bc81e2dfecb485b mbs1/SRPMS/php-mnogosearch-1.96-35.1.mbs1.src.rpm 98d85dfb93b0a0c269a9a2d3f6f0eede mbs1/SRPMS/php-mongo-1.4.5-1.mbs1.src.rpm 2524e31d5a61e1352dce360526149544 mbs1/SRPMS/php-newt-1.2.8-1.mbs1.src.rpm b117d574a2eb07efbeef7e68eb3dbf38 mbs1/SRPMS/php-oggvorbis-0.2-33.1.mbs1.src.rpm 25eef544c81b44775441da1a9d4a5f8e mbs1/SRPMS/php-pam-1.0.3-10.1.mbs1.src.rpm e4812e2fb71334c1470855047d33ff92 mbs1/SRPMS/php-proctitle-0.1.2-1.mbs1.src.rpm b34e461b5688ed89bcde35f46d34615a mbs1/SRPMS/php-radius-1.2.7-1.1.mbs1.src.rpm 40dbef246efb480f12286479828f0172 mbs1/SRPMS/php-rrdtool-0-35.1.mbs1.src.rpm 60701f0629317b0bec9f1bdd43354e19 mbs1/SRPMS/php-sasl-0.1.0-36.1.mbs1.src.rpm 5a75e8c81e606385c707b714b6282e5a mbs1/SRPMS/php-sqlite-1.0.3-1.mbs1.src.rpm ca0c2cf7daea363b6dbe0b1ef89982c1 mbs1/SRPMS/php-ssh2-0.12-1.mbs1.src.rpm 2df05fb13a6318aa63d52b58018aaac9 mbs1/SRPMS/php-suhosin-0.9.33-7.2.mbs1.src.rpm 9a9ab66c2049d3b901a1a29cb41866fc mbs1/SRPMS/php-svn-1.0.2-1.mbs1.src.rpm 62182c75a65d16872febeb225d345f40 mbs1/SRPMS/php-swish-0.5.0-1.mbs1.src.rpm fdb525c5d728fb5058edc0bde32f8207 mbs1/SRPMS/php-syck-0.9.3-17.1.mbs1.src.rpm fdc70578239b8ad71a29d2164346b2e3 mbs1/SRPMS/php-tcpwrap-1.1.3-18.1.mbs1.src.rpm 7eca5e164fe2c13313d24fa2d9192b2f mbs1/SRPMS/php-tdb-1.0.0-18.1.mbs1.src.rpm d9b8b9498a693a047250431b387d1a38 mbs1/SRPMS/php-timezonedb-2013.9-1.1.mbs1.src.rpm 05f98d011308f8e5b93678bc6f8131de mbs1/SRPMS/php-tk-0.1.1-29.1.mbs1.src.rpm cf608a75bbbaea51c1ce0b04719ce746 mbs1/SRPMS/php-txforward-1.0.7-3.1.mbs1.src.rpm 4a1bae8e064b076164b81d5e79bd5e4b mbs1/SRPMS/php-uploadprogress-1.0.3.1-3.1.mbs1.src.rpm 23a9cf1fa7db9dc8843c9262795a1eb1 mbs1/SRPMS/php-uuid-1.0.3-1.mbs1.src.rpm f1c54907e7c544dfd95764da8175f749 mbs1/SRPMS/php-wbxml-1.0.3-14.1.mbs1.src.rpm 2c57275de2451e91cbfc271ae14595dc mbs1/SRPMS/php-xattr-1.2.0-1.mbs1.src.rpm 82d034516dcfe4fbaf68640ccd017a1f mbs1/SRPMS/php-xdiff-1.5.2-1.mbs1.src.rpm c19da5f5199dbc4d58a2c1d9b7de5bff mbs1/SRPMS/php-xslcache-0.7.2-1.mbs1.src.rpm b05fbb9a7a6ca882fcb7ed4cab1c3886 mbs1/SRPMS/php-yaml-1.1.1-1.mbs1.src.rpm b2859baaf205be29a938df103529659d mbs1/SRPMS/php-yaz-1.1.6-1.mbs1.src.rpm 8544a9059f4099bc17bdd31cb2218aee mbs1/SRPMS/php-yp-5.2.3-25.1.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. ============================================================================ Ubuntu Security Notice USN-2055-1 December 12, 2013
php5 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in PHP. (CVE-2013-6420)
It was discovered that PHP incorrectly handled DateInterval objects. (CVE-2013-6712)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.10: libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.1 php5-cgi 5.5.3+dfsg-1ubuntu2.1 php5-cli 5.5.3+dfsg-1ubuntu2.1
Ubuntu 13.04: libapache2-mod-php5 5.4.9-4ubuntu2.4 php5-cgi 5.4.9-4ubuntu2.4 php5-cli 5.4.9-4ubuntu2.4
Ubuntu 12.10: libapache2-mod-php5 5.4.6-1ubuntu1.5 php5-cgi 5.4.6-1ubuntu1.5 php5-cli 5.4.6-1ubuntu1.5
Ubuntu 12.04 LTS: libapache2-mod-php5 5.3.10-1ubuntu3.9 php5-cgi 5.3.10-1ubuntu3.9 php5-cli 5.3.10-1ubuntu3.9
Ubuntu 10.04 LTS: libapache2-mod-php5 5.3.2-1ubuntu4.22 php5-cgi 5.3.2-1ubuntu4.22 php5-cli 5.3.2-1ubuntu4.22
In general, a standard system update will make all the necessary changes.
Release Date: 2014-09-30 Last Updated: 2014-09-30
Potential Security Impact: Cross-site scripting (XSS), Cross-site Request Forgery (CSRF), unauthorized disclosure of information, Denial of Service (DoS), and Clickjacking
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Cross-site Scripting (XSS), Cross-site Request Forgery (CSRF), unauthorized disclosure of information, Denial of Service (DoS), and Clickjacking.
References:
CVE-2013-4545 Unauthorized modification CVE-2013-6420 (SSRT101447) Unauthorized disclosure of information CVE-2013-6422 Unauthorized disclosure of information CVE-2013-6712 (SSRT101447) Denial of Service (DoS) CVE-2014-2640 (SSRT101633, SSRT101438) Cross-site Scripting (XSS) CVE-2014-2641 (SSRT101438) Cross-site Request Forgery (CSRF) CVE-2014-2642 (SSRT101701) Clickjacking
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) for Linux and Windows prior to version 7.4
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-4545 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2013-6420 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2013-6422 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2013-6712 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2014-2640 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-2641 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0 CVE-2014-2642 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following software updates available to resolve the vulnerabilities for the impacted versions of HP System Management Homepage (SMH) for Linux and Windows:
http://h18013.www1.hp.com/products/servers/management/agents/
HISTORY Version:1 (rev.1) - 30 September 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: php53 and php security update Advisory ID: RHSA-2014:1012-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1012.html Issue date: 2014-08-06 CVE Names: CVE-2012-1571 CVE-2013-6712 CVE-2014-0237 CVE-2014-0238 CVE-2014-1943 CVE-2014-2270 CVE-2014-3479 CVE-2014-3480 CVE-2014-3515 CVE-2014-4049 CVE-2014-4721 =====================================================================
- Summary:
Updated php53 and php packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6 respectively.
The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. PHP's fileinfo module provides functions used to identify a particular file according to the type of data contained by the file.
Multiple denial of service flaws were found in the way the File Information (fileinfo) extension parsed certain Composite Document Format (CDF) files. A remote attacker could use either of these flaws to crash a PHP application using fileinfo via a specially crafted CDF file. (CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, CVE-2012-1571)
Two denial of service flaws were found in the way the File Information (fileinfo) extension handled indirect and search rules. A remote attacker could use either of these flaws to cause a PHP application using fileinfo to crash or consume an excessive amount of CPU. (CVE-2014-1943, CVE-2014-2270)
A heap-based buffer overflow flaw was found in the way PHP parsed DNS TXT records. A malicious DNS server or a man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application used the dns_get_record() function to perform a DNS query. (CVE-2014-4049)
A type confusion issue was found in PHP's phpinfo() function. A malicious script author could possibly use this flaw to disclose certain portions of server memory. (CVE-2014-4721)
A buffer over-read flaw was found in the way the DateInterval class parsed interval specifications. An attacker able to make a PHP application parse a specially crafted specification using DateInterval could possibly cause the PHP interpreter to crash. (CVE-2013-6712)
A type confusion issue was found in the SPL ArrayObject and SPLObjectStorage classes' unserialize() method. A remote attacker able to submit specially crafted input to a PHP application, which would then unserialize this input using one of the aforementioned methods, could use this flaw to execute arbitrary code with the privileges of the user running that PHP application. (CVE-2014-3515)
The CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, and CVE-2014-3480 issues were discovered by Francisco Alonso of Red Hat Product Security.
All php53 and php users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
805197 - CVE-2012-1571 file: out of bounds read in CDF parser 1035670 - CVE-2013-6712 php: heap-based buffer over-read in DateInterval 1065836 - CVE-2014-1943 file: unrestricted recursion in handling of indirect type rules 1072220 - CVE-2014-2270 file: out-of-bounds access in search rules with offsets from input file 1098155 - CVE-2014-0238 file: CDF property info parsing nelements infinite loop 1098193 - CVE-2014-0237 file: cdf_unpack_summary_info() excessive looping DoS 1104858 - CVE-2014-3480 file: cdf_count_chain insufficient boundary check 1104869 - CVE-2014-3479 file: cdf_check_stream_offset insufficient boundary check 1108447 - CVE-2014-4049 php: heap-based buffer overflow in DNS TXT record parsing 1112154 - CVE-2014-3515 php: unserialize() SPL ArrayObject / SPLObjectStorage type confusion flaw 1116662 - CVE-2014-4721 php: type confusion issue in phpinfo() leading to information leak
- Package List:
Red Hat Enterprise Linux Desktop Workstation (v. 5 client):
Source: php53-5.3.3-23.el5_10.src.rpm
i386: php53-5.3.3-23.el5_10.i386.rpm php53-bcmath-5.3.3-23.el5_10.i386.rpm php53-cli-5.3.3-23.el5_10.i386.rpm php53-common-5.3.3-23.el5_10.i386.rpm php53-dba-5.3.3-23.el5_10.i386.rpm php53-debuginfo-5.3.3-23.el5_10.i386.rpm php53-devel-5.3.3-23.el5_10.i386.rpm php53-gd-5.3.3-23.el5_10.i386.rpm php53-imap-5.3.3-23.el5_10.i386.rpm php53-intl-5.3.3-23.el5_10.i386.rpm php53-ldap-5.3.3-23.el5_10.i386.rpm php53-mbstring-5.3.3-23.el5_10.i386.rpm php53-mysql-5.3.3-23.el5_10.i386.rpm php53-odbc-5.3.3-23.el5_10.i386.rpm php53-pdo-5.3.3-23.el5_10.i386.rpm php53-pgsql-5.3.3-23.el5_10.i386.rpm php53-process-5.3.3-23.el5_10.i386.rpm php53-pspell-5.3.3-23.el5_10.i386.rpm php53-snmp-5.3.3-23.el5_10.i386.rpm php53-soap-5.3.3-23.el5_10.i386.rpm php53-xml-5.3.3-23.el5_10.i386.rpm php53-xmlrpc-5.3.3-23.el5_10.i386.rpm
x86_64: php53-5.3.3-23.el5_10.x86_64.rpm php53-bcmath-5.3.3-23.el5_10.x86_64.rpm php53-cli-5.3.3-23.el5_10.x86_64.rpm php53-common-5.3.3-23.el5_10.x86_64.rpm php53-dba-5.3.3-23.el5_10.x86_64.rpm php53-debuginfo-5.3.3-23.el5_10.x86_64.rpm php53-devel-5.3.3-23.el5_10.x86_64.rpm php53-gd-5.3.3-23.el5_10.x86_64.rpm php53-imap-5.3.3-23.el5_10.x86_64.rpm php53-intl-5.3.3-23.el5_10.x86_64.rpm php53-ldap-5.3.3-23.el5_10.x86_64.rpm php53-mbstring-5.3.3-23.el5_10.x86_64.rpm php53-mysql-5.3.3-23.el5_10.x86_64.rpm php53-odbc-5.3.3-23.el5_10.x86_64.rpm php53-pdo-5.3.3-23.el5_10.x86_64.rpm php53-pgsql-5.3.3-23.el5_10.x86_64.rpm php53-process-5.3.3-23.el5_10.x86_64.rpm php53-pspell-5.3.3-23.el5_10.x86_64.rpm php53-snmp-5.3.3-23.el5_10.x86_64.rpm php53-soap-5.3.3-23.el5_10.x86_64.rpm php53-xml-5.3.3-23.el5_10.x86_64.rpm php53-xmlrpc-5.3.3-23.el5_10.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: php53-5.3.3-23.el5_10.src.rpm
i386: php53-5.3.3-23.el5_10.i386.rpm php53-bcmath-5.3.3-23.el5_10.i386.rpm php53-cli-5.3.3-23.el5_10.i386.rpm php53-common-5.3.3-23.el5_10.i386.rpm php53-dba-5.3.3-23.el5_10.i386.rpm php53-debuginfo-5.3.3-23.el5_10.i386.rpm php53-devel-5.3.3-23.el5_10.i386.rpm php53-gd-5.3.3-23.el5_10.i386.rpm php53-imap-5.3.3-23.el5_10.i386.rpm php53-intl-5.3.3-23.el5_10.i386.rpm php53-ldap-5.3.3-23.el5_10.i386.rpm php53-mbstring-5.3.3-23.el5_10.i386.rpm php53-mysql-5.3.3-23.el5_10.i386.rpm php53-odbc-5.3.3-23.el5_10.i386.rpm php53-pdo-5.3.3-23.el5_10.i386.rpm php53-pgsql-5.3.3-23.el5_10.i386.rpm php53-process-5.3.3-23.el5_10.i386.rpm php53-pspell-5.3.3-23.el5_10.i386.rpm php53-snmp-5.3.3-23.el5_10.i386.rpm php53-soap-5.3.3-23.el5_10.i386.rpm php53-xml-5.3.3-23.el5_10.i386.rpm php53-xmlrpc-5.3.3-23.el5_10.i386.rpm
ia64: php53-5.3.3-23.el5_10.ia64.rpm php53-bcmath-5.3.3-23.el5_10.ia64.rpm php53-cli-5.3.3-23.el5_10.ia64.rpm php53-common-5.3.3-23.el5_10.ia64.rpm php53-dba-5.3.3-23.el5_10.ia64.rpm php53-debuginfo-5.3.3-23.el5_10.ia64.rpm php53-devel-5.3.3-23.el5_10.ia64.rpm php53-gd-5.3.3-23.el5_10.ia64.rpm php53-imap-5.3.3-23.el5_10.ia64.rpm php53-intl-5.3.3-23.el5_10.ia64.rpm php53-ldap-5.3.3-23.el5_10.ia64.rpm php53-mbstring-5.3.3-23.el5_10.ia64.rpm php53-mysql-5.3.3-23.el5_10.ia64.rpm php53-odbc-5.3.3-23.el5_10.ia64.rpm php53-pdo-5.3.3-23.el5_10.ia64.rpm php53-pgsql-5.3.3-23.el5_10.ia64.rpm php53-process-5.3.3-23.el5_10.ia64.rpm php53-pspell-5.3.3-23.el5_10.ia64.rpm php53-snmp-5.3.3-23.el5_10.ia64.rpm php53-soap-5.3.3-23.el5_10.ia64.rpm php53-xml-5.3.3-23.el5_10.ia64.rpm php53-xmlrpc-5.3.3-23.el5_10.ia64.rpm
ppc: php53-5.3.3-23.el5_10.ppc.rpm php53-bcmath-5.3.3-23.el5_10.ppc.rpm php53-cli-5.3.3-23.el5_10.ppc.rpm php53-common-5.3.3-23.el5_10.ppc.rpm php53-dba-5.3.3-23.el5_10.ppc.rpm php53-debuginfo-5.3.3-23.el5_10.ppc.rpm php53-devel-5.3.3-23.el5_10.ppc.rpm php53-gd-5.3.3-23.el5_10.ppc.rpm php53-imap-5.3.3-23.el5_10.ppc.rpm php53-intl-5.3.3-23.el5_10.ppc.rpm php53-ldap-5.3.3-23.el5_10.ppc.rpm php53-mbstring-5.3.3-23.el5_10.ppc.rpm php53-mysql-5.3.3-23.el5_10.ppc.rpm php53-odbc-5.3.3-23.el5_10.ppc.rpm php53-pdo-5.3.3-23.el5_10.ppc.rpm php53-pgsql-5.3.3-23.el5_10.ppc.rpm php53-process-5.3.3-23.el5_10.ppc.rpm php53-pspell-5.3.3-23.el5_10.ppc.rpm php53-snmp-5.3.3-23.el5_10.ppc.rpm php53-soap-5.3.3-23.el5_10.ppc.rpm php53-xml-5.3.3-23.el5_10.ppc.rpm php53-xmlrpc-5.3.3-23.el5_10.ppc.rpm
s390x: php53-5.3.3-23.el5_10.s390x.rpm php53-bcmath-5.3.3-23.el5_10.s390x.rpm php53-cli-5.3.3-23.el5_10.s390x.rpm php53-common-5.3.3-23.el5_10.s390x.rpm php53-dba-5.3.3-23.el5_10.s390x.rpm php53-debuginfo-5.3.3-23.el5_10.s390x.rpm php53-devel-5.3.3-23.el5_10.s390x.rpm php53-gd-5.3.3-23.el5_10.s390x.rpm php53-imap-5.3.3-23.el5_10.s390x.rpm php53-intl-5.3.3-23.el5_10.s390x.rpm php53-ldap-5.3.3-23.el5_10.s390x.rpm php53-mbstring-5.3.3-23.el5_10.s390x.rpm php53-mysql-5.3.3-23.el5_10.s390x.rpm php53-odbc-5.3.3-23.el5_10.s390x.rpm php53-pdo-5.3.3-23.el5_10.s390x.rpm php53-pgsql-5.3.3-23.el5_10.s390x.rpm php53-process-5.3.3-23.el5_10.s390x.rpm php53-pspell-5.3.3-23.el5_10.s390x.rpm php53-snmp-5.3.3-23.el5_10.s390x.rpm php53-soap-5.3.3-23.el5_10.s390x.rpm php53-xml-5.3.3-23.el5_10.s390x.rpm php53-xmlrpc-5.3.3-23.el5_10.s390x.rpm
x86_64: php53-5.3.3-23.el5_10.x86_64.rpm php53-bcmath-5.3.3-23.el5_10.x86_64.rpm php53-cli-5.3.3-23.el5_10.x86_64.rpm php53-common-5.3.3-23.el5_10.x86_64.rpm php53-dba-5.3.3-23.el5_10.x86_64.rpm php53-debuginfo-5.3.3-23.el5_10.x86_64.rpm php53-devel-5.3.3-23.el5_10.x86_64.rpm php53-gd-5.3.3-23.el5_10.x86_64.rpm php53-imap-5.3.3-23.el5_10.x86_64.rpm php53-intl-5.3.3-23.el5_10.x86_64.rpm php53-ldap-5.3.3-23.el5_10.x86_64.rpm php53-mbstring-5.3.3-23.el5_10.x86_64.rpm php53-mysql-5.3.3-23.el5_10.x86_64.rpm php53-odbc-5.3.3-23.el5_10.x86_64.rpm php53-pdo-5.3.3-23.el5_10.x86_64.rpm php53-pgsql-5.3.3-23.el5_10.x86_64.rpm php53-process-5.3.3-23.el5_10.x86_64.rpm php53-pspell-5.3.3-23.el5_10.x86_64.rpm php53-snmp-5.3.3-23.el5_10.x86_64.rpm php53-soap-5.3.3-23.el5_10.x86_64.rpm php53-xml-5.3.3-23.el5_10.x86_64.rpm php53-xmlrpc-5.3.3-23.el5_10.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: php-5.3.3-27.el6_5.1.src.rpm
i386: php-5.3.3-27.el6_5.1.i686.rpm php-bcmath-5.3.3-27.el6_5.1.i686.rpm php-cli-5.3.3-27.el6_5.1.i686.rpm php-common-5.3.3-27.el6_5.1.i686.rpm php-dba-5.3.3-27.el6_5.1.i686.rpm php-debuginfo-5.3.3-27.el6_5.1.i686.rpm php-devel-5.3.3-27.el6_5.1.i686.rpm php-embedded-5.3.3-27.el6_5.1.i686.rpm php-enchant-5.3.3-27.el6_5.1.i686.rpm php-fpm-5.3.3-27.el6_5.1.i686.rpm php-gd-5.3.3-27.el6_5.1.i686.rpm php-imap-5.3.3-27.el6_5.1.i686.rpm php-intl-5.3.3-27.el6_5.1.i686.rpm php-ldap-5.3.3-27.el6_5.1.i686.rpm php-mbstring-5.3.3-27.el6_5.1.i686.rpm php-mysql-5.3.3-27.el6_5.1.i686.rpm php-odbc-5.3.3-27.el6_5.1.i686.rpm php-pdo-5.3.3-27.el6_5.1.i686.rpm php-pgsql-5.3.3-27.el6_5.1.i686.rpm php-process-5.3.3-27.el6_5.1.i686.rpm php-pspell-5.3.3-27.el6_5.1.i686.rpm php-recode-5.3.3-27.el6_5.1.i686.rpm php-snmp-5.3.3-27.el6_5.1.i686.rpm php-soap-5.3.3-27.el6_5.1.i686.rpm php-tidy-5.3.3-27.el6_5.1.i686.rpm php-xml-5.3.3-27.el6_5.1.i686.rpm php-xmlrpc-5.3.3-27.el6_5.1.i686.rpm php-zts-5.3.3-27.el6_5.1.i686.rpm
x86_64: php-5.3.3-27.el6_5.1.x86_64.rpm php-bcmath-5.3.3-27.el6_5.1.x86_64.rpm php-cli-5.3.3-27.el6_5.1.x86_64.rpm php-common-5.3.3-27.el6_5.1.x86_64.rpm php-dba-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm php-devel-5.3.3-27.el6_5.1.x86_64.rpm php-embedded-5.3.3-27.el6_5.1.x86_64.rpm php-enchant-5.3.3-27.el6_5.1.x86_64.rpm php-fpm-5.3.3-27.el6_5.1.x86_64.rpm php-gd-5.3.3-27.el6_5.1.x86_64.rpm php-imap-5.3.3-27.el6_5.1.x86_64.rpm php-intl-5.3.3-27.el6_5.1.x86_64.rpm php-ldap-5.3.3-27.el6_5.1.x86_64.rpm php-mbstring-5.3.3-27.el6_5.1.x86_64.rpm php-mysql-5.3.3-27.el6_5.1.x86_64.rpm php-odbc-5.3.3-27.el6_5.1.x86_64.rpm php-pdo-5.3.3-27.el6_5.1.x86_64.rpm php-pgsql-5.3.3-27.el6_5.1.x86_64.rpm php-process-5.3.3-27.el6_5.1.x86_64.rpm php-pspell-5.3.3-27.el6_5.1.x86_64.rpm php-recode-5.3.3-27.el6_5.1.x86_64.rpm php-snmp-5.3.3-27.el6_5.1.x86_64.rpm php-soap-5.3.3-27.el6_5.1.x86_64.rpm php-tidy-5.3.3-27.el6_5.1.x86_64.rpm php-xml-5.3.3-27.el6_5.1.x86_64.rpm php-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm php-zts-5.3.3-27.el6_5.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: php-5.3.3-27.el6_5.1.src.rpm
x86_64: php-cli-5.3.3-27.el6_5.1.x86_64.rpm php-common-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: php-5.3.3-27.el6_5.1.src.rpm
x86_64: php-5.3.3-27.el6_5.1.x86_64.rpm php-bcmath-5.3.3-27.el6_5.1.x86_64.rpm php-dba-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm php-devel-5.3.3-27.el6_5.1.x86_64.rpm php-embedded-5.3.3-27.el6_5.1.x86_64.rpm php-enchant-5.3.3-27.el6_5.1.x86_64.rpm php-fpm-5.3.3-27.el6_5.1.x86_64.rpm php-gd-5.3.3-27.el6_5.1.x86_64.rpm php-imap-5.3.3-27.el6_5.1.x86_64.rpm php-intl-5.3.3-27.el6_5.1.x86_64.rpm php-ldap-5.3.3-27.el6_5.1.x86_64.rpm php-mbstring-5.3.3-27.el6_5.1.x86_64.rpm php-mysql-5.3.3-27.el6_5.1.x86_64.rpm php-odbc-5.3.3-27.el6_5.1.x86_64.rpm php-pdo-5.3.3-27.el6_5.1.x86_64.rpm php-pgsql-5.3.3-27.el6_5.1.x86_64.rpm php-process-5.3.3-27.el6_5.1.x86_64.rpm php-pspell-5.3.3-27.el6_5.1.x86_64.rpm php-recode-5.3.3-27.el6_5.1.x86_64.rpm php-snmp-5.3.3-27.el6_5.1.x86_64.rpm php-soap-5.3.3-27.el6_5.1.x86_64.rpm php-tidy-5.3.3-27.el6_5.1.x86_64.rpm php-xml-5.3.3-27.el6_5.1.x86_64.rpm php-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm php-zts-5.3.3-27.el6_5.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: php-5.3.3-27.el6_5.1.src.rpm
i386: php-5.3.3-27.el6_5.1.i686.rpm php-cli-5.3.3-27.el6_5.1.i686.rpm php-common-5.3.3-27.el6_5.1.i686.rpm php-debuginfo-5.3.3-27.el6_5.1.i686.rpm php-debuginfo-5.3.3-27.el6_5.1.i686.rpm php-gd-5.3.3-27.el6_5.1.i686.rpm php-gd-5.3.3-27.el6_5.1.i686.rpm php-ldap-5.3.3-27.el6_5.1.i686.rpm php-mysql-5.3.3-27.el6_5.1.i686.rpm php-mysql-5.3.3-27.el6_5.1.i686.rpm php-odbc-5.3.3-27.el6_5.1.i686.rpm php-odbc-5.3.3-27.el6_5.1.i686.rpm php-pdo-5.3.3-27.el6_5.1.i686.rpm php-pgsql-5.3.3-27.el6_5.1.i686.rpm php-soap-5.3.3-27.el6_5.1.i686.rpm php-xml-5.3.3-27.el6_5.1.i686.rpm php-xml-5.3.3-27.el6_5.1.i686.rpm php-xmlrpc-5.3.3-27.el6_5.1.i686.rpm
ppc64: php-5.3.3-27.el6_5.1.ppc64.rpm php-cli-5.3.3-27.el6_5.1.ppc64.rpm php-common-5.3.3-27.el6_5.1.ppc64.rpm php-debuginfo-5.3.3-27.el6_5.1.ppc64.rpm php-debuginfo-5.3.3-27.el6_5.1.ppc64.rpm php-gd-5.3.3-27.el6_5.1.ppc64.rpm php-gd-5.3.3-27.el6_5.1.ppc64.rpm php-ldap-5.3.3-27.el6_5.1.ppc64.rpm php-mysql-5.3.3-27.el6_5.1.ppc64.rpm php-mysql-5.3.3-27.el6_5.1.ppc64.rpm php-odbc-5.3.3-27.el6_5.1.ppc64.rpm php-odbc-5.3.3-27.el6_5.1.ppc64.rpm php-pdo-5.3.3-27.el6_5.1.ppc64.rpm php-pgsql-5.3.3-27.el6_5.1.ppc64.rpm php-soap-5.3.3-27.el6_5.1.ppc64.rpm php-xml-5.3.3-27.el6_5.1.ppc64.rpm php-xml-5.3.3-27.el6_5.1.ppc64.rpm php-xmlrpc-5.3.3-27.el6_5.1.ppc64.rpm
s390x: php-5.3.3-27.el6_5.1.s390x.rpm php-cli-5.3.3-27.el6_5.1.s390x.rpm php-common-5.3.3-27.el6_5.1.s390x.rpm php-debuginfo-5.3.3-27.el6_5.1.s390x.rpm php-debuginfo-5.3.3-27.el6_5.1.s390x.rpm php-gd-5.3.3-27.el6_5.1.s390x.rpm php-gd-5.3.3-27.el6_5.1.s390x.rpm php-ldap-5.3.3-27.el6_5.1.s390x.rpm php-mysql-5.3.3-27.el6_5.1.s390x.rpm php-mysql-5.3.3-27.el6_5.1.s390x.rpm php-odbc-5.3.3-27.el6_5.1.s390x.rpm php-odbc-5.3.3-27.el6_5.1.s390x.rpm php-pdo-5.3.3-27.el6_5.1.s390x.rpm php-pgsql-5.3.3-27.el6_5.1.s390x.rpm php-soap-5.3.3-27.el6_5.1.s390x.rpm php-xml-5.3.3-27.el6_5.1.s390x.rpm php-xmlrpc-5.3.3-27.el6_5.1.s390x.rpm
x86_64: php-5.3.3-27.el6_5.1.x86_64.rpm php-cli-5.3.3-27.el6_5.1.x86_64.rpm php-common-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm php-gd-5.3.3-27.el6_5.1.x86_64.rpm php-gd-5.3.3-27.el6_5.1.x86_64.rpm php-ldap-5.3.3-27.el6_5.1.x86_64.rpm php-mysql-5.3.3-27.el6_5.1.x86_64.rpm php-mysql-5.3.3-27.el6_5.1.x86_64.rpm php-odbc-5.3.3-27.el6_5.1.x86_64.rpm php-odbc-5.3.3-27.el6_5.1.x86_64.rpm php-pdo-5.3.3-27.el6_5.1.x86_64.rpm php-pgsql-5.3.3-27.el6_5.1.x86_64.rpm php-soap-5.3.3-27.el6_5.1.x86_64.rpm php-xml-5.3.3-27.el6_5.1.x86_64.rpm php-xml-5.3.3-27.el6_5.1.x86_64.rpm php-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: php-5.3.3-27.el6_5.1.src.rpm
i386: php-bcmath-5.3.3-27.el6_5.1.i686.rpm php-dba-5.3.3-27.el6_5.1.i686.rpm php-debuginfo-5.3.3-27.el6_5.1.i686.rpm php-devel-5.3.3-27.el6_5.1.i686.rpm php-embedded-5.3.3-27.el6_5.1.i686.rpm php-enchant-5.3.3-27.el6_5.1.i686.rpm php-fpm-5.3.3-27.el6_5.1.i686.rpm php-imap-5.3.3-27.el6_5.1.i686.rpm php-intl-5.3.3-27.el6_5.1.i686.rpm php-mbstring-5.3.3-27.el6_5.1.i686.rpm php-process-5.3.3-27.el6_5.1.i686.rpm php-pspell-5.3.3-27.el6_5.1.i686.rpm php-recode-5.3.3-27.el6_5.1.i686.rpm php-snmp-5.3.3-27.el6_5.1.i686.rpm php-tidy-5.3.3-27.el6_5.1.i686.rpm php-zts-5.3.3-27.el6_5.1.i686.rpm
ppc64: php-bcmath-5.3.3-27.el6_5.1.ppc64.rpm php-dba-5.3.3-27.el6_5.1.ppc64.rpm php-debuginfo-5.3.3-27.el6_5.1.ppc64.rpm php-devel-5.3.3-27.el6_5.1.ppc64.rpm php-embedded-5.3.3-27.el6_5.1.ppc64.rpm php-enchant-5.3.3-27.el6_5.1.ppc64.rpm php-fpm-5.3.3-27.el6_5.1.ppc64.rpm php-imap-5.3.3-27.el6_5.1.ppc64.rpm php-intl-5.3.3-27.el6_5.1.ppc64.rpm php-mbstring-5.3.3-27.el6_5.1.ppc64.rpm php-process-5.3.3-27.el6_5.1.ppc64.rpm php-pspell-5.3.3-27.el6_5.1.ppc64.rpm php-recode-5.3.3-27.el6_5.1.ppc64.rpm php-snmp-5.3.3-27.el6_5.1.ppc64.rpm php-tidy-5.3.3-27.el6_5.1.ppc64.rpm php-zts-5.3.3-27.el6_5.1.ppc64.rpm
s390x: php-bcmath-5.3.3-27.el6_5.1.s390x.rpm php-dba-5.3.3-27.el6_5.1.s390x.rpm php-debuginfo-5.3.3-27.el6_5.1.s390x.rpm php-devel-5.3.3-27.el6_5.1.s390x.rpm php-embedded-5.3.3-27.el6_5.1.s390x.rpm php-enchant-5.3.3-27.el6_5.1.s390x.rpm php-fpm-5.3.3-27.el6_5.1.s390x.rpm php-imap-5.3.3-27.el6_5.1.s390x.rpm php-intl-5.3.3-27.el6_5.1.s390x.rpm php-mbstring-5.3.3-27.el6_5.1.s390x.rpm php-process-5.3.3-27.el6_5.1.s390x.rpm php-pspell-5.3.3-27.el6_5.1.s390x.rpm php-recode-5.3.3-27.el6_5.1.s390x.rpm php-snmp-5.3.3-27.el6_5.1.s390x.rpm php-tidy-5.3.3-27.el6_5.1.s390x.rpm php-zts-5.3.3-27.el6_5.1.s390x.rpm
x86_64: php-bcmath-5.3.3-27.el6_5.1.x86_64.rpm php-dba-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm php-devel-5.3.3-27.el6_5.1.x86_64.rpm php-embedded-5.3.3-27.el6_5.1.x86_64.rpm php-enchant-5.3.3-27.el6_5.1.x86_64.rpm php-fpm-5.3.3-27.el6_5.1.x86_64.rpm php-imap-5.3.3-27.el6_5.1.x86_64.rpm php-intl-5.3.3-27.el6_5.1.x86_64.rpm php-mbstring-5.3.3-27.el6_5.1.x86_64.rpm php-process-5.3.3-27.el6_5.1.x86_64.rpm php-pspell-5.3.3-27.el6_5.1.x86_64.rpm php-recode-5.3.3-27.el6_5.1.x86_64.rpm php-snmp-5.3.3-27.el6_5.1.x86_64.rpm php-tidy-5.3.3-27.el6_5.1.x86_64.rpm php-zts-5.3.3-27.el6_5.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: php-5.3.3-27.el6_5.1.src.rpm
i386: php-5.3.3-27.el6_5.1.i686.rpm php-cli-5.3.3-27.el6_5.1.i686.rpm php-common-5.3.3-27.el6_5.1.i686.rpm php-debuginfo-5.3.3-27.el6_5.1.i686.rpm php-gd-5.3.3-27.el6_5.1.i686.rpm php-ldap-5.3.3-27.el6_5.1.i686.rpm php-mysql-5.3.3-27.el6_5.1.i686.rpm php-odbc-5.3.3-27.el6_5.1.i686.rpm php-pdo-5.3.3-27.el6_5.1.i686.rpm php-pgsql-5.3.3-27.el6_5.1.i686.rpm php-soap-5.3.3-27.el6_5.1.i686.rpm php-xml-5.3.3-27.el6_5.1.i686.rpm php-xmlrpc-5.3.3-27.el6_5.1.i686.rpm
x86_64: php-5.3.3-27.el6_5.1.x86_64.rpm php-cli-5.3.3-27.el6_5.1.x86_64.rpm php-common-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm php-gd-5.3.3-27.el6_5.1.x86_64.rpm php-ldap-5.3.3-27.el6_5.1.x86_64.rpm php-mysql-5.3.3-27.el6_5.1.x86_64.rpm php-odbc-5.3.3-27.el6_5.1.x86_64.rpm php-pdo-5.3.3-27.el6_5.1.x86_64.rpm php-pgsql-5.3.3-27.el6_5.1.x86_64.rpm php-soap-5.3.3-27.el6_5.1.x86_64.rpm php-xml-5.3.3-27.el6_5.1.x86_64.rpm php-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: php-5.3.3-27.el6_5.1.src.rpm
i386: php-bcmath-5.3.3-27.el6_5.1.i686.rpm php-dba-5.3.3-27.el6_5.1.i686.rpm php-debuginfo-5.3.3-27.el6_5.1.i686.rpm php-devel-5.3.3-27.el6_5.1.i686.rpm php-embedded-5.3.3-27.el6_5.1.i686.rpm php-enchant-5.3.3-27.el6_5.1.i686.rpm php-fpm-5.3.3-27.el6_5.1.i686.rpm php-imap-5.3.3-27.el6_5.1.i686.rpm php-intl-5.3.3-27.el6_5.1.i686.rpm php-mbstring-5.3.3-27.el6_5.1.i686.rpm php-process-5.3.3-27.el6_5.1.i686.rpm php-pspell-5.3.3-27.el6_5.1.i686.rpm php-recode-5.3.3-27.el6_5.1.i686.rpm php-snmp-5.3.3-27.el6_5.1.i686.rpm php-tidy-5.3.3-27.el6_5.1.i686.rpm php-zts-5.3.3-27.el6_5.1.i686.rpm
x86_64: php-bcmath-5.3.3-27.el6_5.1.x86_64.rpm php-dba-5.3.3-27.el6_5.1.x86_64.rpm php-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm php-devel-5.3.3-27.el6_5.1.x86_64.rpm php-embedded-5.3.3-27.el6_5.1.x86_64.rpm php-enchant-5.3.3-27.el6_5.1.x86_64.rpm php-fpm-5.3.3-27.el6_5.1.x86_64.rpm php-imap-5.3.3-27.el6_5.1.x86_64.rpm php-intl-5.3.3-27.el6_5.1.x86_64.rpm php-mbstring-5.3.3-27.el6_5.1.x86_64.rpm php-process-5.3.3-27.el6_5.1.x86_64.rpm php-pspell-5.3.3-27.el6_5.1.x86_64.rpm php-recode-5.3.3-27.el6_5.1.x86_64.rpm php-snmp-5.3.3-27.el6_5.1.x86_64.rpm php-tidy-5.3.3-27.el6_5.1.x86_64.rpm php-zts-5.3.3-27.el6_5.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2012-1571.html https://www.redhat.com/security/data/cve/CVE-2013-6712.html https://www.redhat.com/security/data/cve/CVE-2014-0237.html https://www.redhat.com/security/data/cve/CVE-2014-0238.html https://www.redhat.com/security/data/cve/CVE-2014-1943.html https://www.redhat.com/security/data/cve/CVE-2014-2270.html https://www.redhat.com/security/data/cve/CVE-2014-3479.html https://www.redhat.com/security/data/cve/CVE-2014-3480.html https://www.redhat.com/security/data/cve/CVE-2014-3515.html https://www.redhat.com/security/data/cve/CVE-2014-4049.html https://www.redhat.com/security/data/cve/CVE-2014-4721.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFT4bujXlSAg2UNWIIRAjupAJ48N95gPfI5/pzaIYdf4przuZNdmwCgjE/L x544JALirz19qNQAHQ4sjzQ= =t3Ft -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . The Common Vulnerabilities and Exposures project identifies the following issues:
CVE-2013-6420
Stefan Esser reported possible memory corruption in
openssl_x509_parse().
In addition, the update for Debian 7 "Wheezy" contains several bugfixes originally targeted for the upcoming Wheezy point release.
For the oldstable distribution (squeeze), these problems have been fixed in version 5.3.3-7+squeeze18.
For the stable distribution (wheezy), these problems have been fixed in version 5.4.4-14+deb7u7.
For the unstable distribution (sid), these problems have been fixed in version 5.5.6+dfsg-2.
We recommend that you upgrade your php5 packages
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "mac os x",
"scope": "lte",
"trust": 1.0,
"vendor": "apple",
"version": "10.10.2"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "12.04"
},
{
"_id": null,
"model": "php",
"scope": "lt",
"trust": 1.0,
"vendor": "php",
"version": "5.3.29"
},
{
"_id": null,
"model": "php",
"scope": "lt",
"trust": 1.0,
"vendor": "php",
"version": "5.4.24"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "13.1"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "7.0"
},
{
"_id": null,
"model": "php",
"scope": "gte",
"trust": 1.0,
"vendor": "php",
"version": "5.4.0"
},
{
"_id": null,
"model": "php",
"scope": "lt",
"trust": 1.0,
"vendor": "php",
"version": "5.5.8"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.04"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "12.2"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "12.10"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "13.04"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "12.3"
},
{
"_id": null,
"model": "php",
"scope": "gte",
"trust": 1.0,
"vendor": "php",
"version": "5.5.0"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "13.10"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "11.4"
},
{
"_id": null,
"model": "php",
"scope": "lte",
"trust": 0.8,
"vendor": "the php group",
"version": "5.5.6"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "10.10 to 10.10.2"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "10.8.5"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "10.9.5"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.6,
"vendor": "novell",
"version": "12.2"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.6,
"vendor": "novell",
"version": "11.4"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.6,
"vendor": "novell",
"version": "12.3"
},
{
"_id": null,
"model": "php",
"scope": "eq",
"trust": 0.6,
"vendor": "php",
"version": "5.5.6"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.6,
"vendor": "novell",
"version": "13.1"
},
{
"_id": null,
"model": "linux lts",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11.4"
},
{
"_id": null,
"model": "enterprise linux desktop workstation client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"_id": null,
"model": "hat enterprise linux workstation",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"_id": null,
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"_id": null,
"model": "hat enterprise linux hpc node",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"_id": null,
"model": "hat enterprise linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"_id": null,
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6.2"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6"
},
{
"_id": null,
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "centos",
"scope": "eq",
"trust": 0.3,
"vendor": "centos",
"version": "6"
}
],
"sources": [
{
"db": "BID",
"id": "64018"
},
{
"db": "CNNVD",
"id": "CNNVD-201311-464"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
},
{
"db": "NVD",
"id": "CVE-2013-6712"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:php:php",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
}
]
},
"credits": {
"_id": null,
"data": "Oden Eriksson",
"sources": [
{
"db": "BID",
"id": "64018"
}
],
"trust": 0.3
},
"cve": "CVE-2013-6712",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2013-6712",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-66714",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2013-6712",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2013-6712",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201311-464",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-66714",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-66714"
},
{
"db": "CNNVD",
"id": "CNNVD-201311-464"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
},
{
"db": "NVD",
"id": "CVE-2013-6712"
}
]
},
"description": {
"_id": null,
"data": "The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification. PHP is prone to a denial-of-service vulnerability due to a heap-based buffer over-read error. \nSuccessful exploits will allow attackers to cause a denial of service condition. Due to the nature of this issue, arbitrary code execution may be possible; this has not been confirmed. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. There is a security vulnerability in the \u0027scan\u0027 function in the ext/date/lib/parse_iso_intervals.c file in PHP 5.5.6 and earlier versions. The vulnerability is caused by the program not properly restricting the creation of DateInterval objects. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201408-11\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: PHP: Multiple vulnerabilities\n Date: August 29, 2014\n Bugs: #459904, #472204, #472558, #474656, #476570, #481004,\n #483212, #485252, #492784, #493982, #501312, #503630,\n #503670, #505172, #505712, #509132, #512288, #512492,\n #513032, #516994, #519932, #520134, #520438\n ID: 201408-11\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in PHP, the worst of\nwhich could lead to remote execution of arbitrary code. \n\nBackground\n==========\n\nPHP is a widely-used general-purpose scripting language that is\nespecially suited for Web development and can be embedded into HTML. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-lang/php \u003c 5.5.16 \u003e= 5.5.16\n *\u003e= 5.4.32\n *\u003e= 5.3.29\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in PHP. Please review the\nCVE identifiers referenced below for details. \n\nImpact\n======\n\nA context-dependent attacker can cause arbitrary code execution, create\na Denial of Service condition, read or write arbitrary files,\nimpersonate other servers, hijack a web session, or have other\nunspecified impact. Additionally, a local attacker could gain escalated\nprivileges. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll PHP 5.5 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-lang/php-5.5.16\"\n\nAll PHP 5.4 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-lang/php-5.4.32\"\n\nAll PHP 5.3 users should upgrade to the latest version. This release\nmarks the end of life of the PHP 5.3 series. Future releases of this\nseries are not planned. All PHP 5.3 users are encouraged to upgrade to\nthe current stable version of PHP 5.5 or previous stable version of PHP\n5.4, which are supported till at least 2016 and 2015 respectively. \n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-lang/php-5.3.29\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-4718\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718\n[ 2 ] CVE-2013-1635\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635\n[ 3 ] CVE-2013-1643\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643\n[ 4 ] CVE-2013-1824\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824\n[ 5 ] CVE-2013-2110\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110\n[ 6 ] CVE-2013-3735\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735\n[ 7 ] CVE-2013-4113\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113\n[ 8 ] CVE-2013-4248\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248\n[ 9 ] CVE-2013-4635\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635\n[ 10 ] CVE-2013-4636\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636\n[ 11 ] CVE-2013-6420\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420\n[ 12 ] CVE-2013-6712\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712\n[ 13 ] CVE-2013-7226\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226\n[ 14 ] CVE-2013-7327\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327\n[ 15 ] CVE-2013-7345\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345\n[ 16 ] CVE-2014-0185\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185\n[ 17 ] CVE-2014-0237\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237\n[ 18 ] CVE-2014-0238\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238\n[ 19 ] CVE-2014-1943\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943\n[ 20 ] CVE-2014-2270\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270\n[ 21 ] CVE-2014-2497\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497\n[ 22 ] CVE-2014-3597\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597\n[ 23 ] CVE-2014-3981\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981\n[ 24 ] CVE-2014-4049\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049\n[ 25 ] CVE-2014-4670\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670\n[ 26 ] CVE-2014-5120\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201408-11.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n \n Additionally, the PECL packages which requires so has been rebuilt\n for php-5.5.8 and some has been upgraded to their latest versions. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712\n http://www.php.net/ChangeLog-5.php#5.5.8\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 6cbe3c3e54feb911f830a84798cba59b mbs1/x86_64/apache-mod_php-5.5.8-1.mbs1.x86_64.rpm\n a10aeb6dd4d85ab4c45b7acb3a080bf1 mbs1/x86_64/lib64json2-0.11-1.mbs1.x86_64.rpm\n e661a00b2ea0b360f73c32c633a5665b mbs1/x86_64/lib64json-devel-0.11-1.mbs1.x86_64.rpm\n b7938d352e62b7679b55c874e06fbe33 mbs1/x86_64/lib64mbfl1-1.2.0-1.mbs1.x86_64.rpm\n 9b84b48d9b2a18e048e1c40c786fc3d5 mbs1/x86_64/lib64mbfl-devel-1.2.0-1.mbs1.x86_64.rpm\n 7d4766a2eb0dd7048917eec2e1f9461f mbs1/x86_64/lib64php5_common5-5.5.8-1.mbs1.x86_64.rpm\n a6a17628ec5c2528b42d0308b44b8602 mbs1/x86_64/php-amf-0.9.2-10.1.mbs1.x86_64.rpm\n f47775a96d510872e93af788c942eb0d mbs1/x86_64/php-apacheaccessor-1.0.1-1.mbs1.x86_64.rpm\n 61c55f41ddc362a27b0d622fd72f832b mbs1/x86_64/php-apc-3.1.15-1.2.mbs1.x86_64.rpm\n 23e851dddb7a7e036eab0bbe753d22fc mbs1/x86_64/php-apc-admin-3.1.15-1.2.mbs1.x86_64.rpm\n 59f6774136e76c82ea13566c73ff5579 mbs1/x86_64/php-apm-1.1.0-1RC2.mbs1.x86_64.rpm\n 41f2071c87dc54edd1b35eb3b050523d mbs1/x86_64/php-archive-0.2-22.1.mbs1.x86_64.rpm\n 6eea5350fd29e56ab3c6530fd4a8eb2d mbs1/x86_64/php-auth_nds-2.2.6-28.1.mbs1.x86_64.rpm\n 09769fd2f27af4498679488463d4f0d0 mbs1/x86_64/php-bbcode-1.0.3-0.0.b1.5.mbs1.x86_64.rpm\n 046aade243a8dfbb4ae5235333404450 mbs1/x86_64/php-bcmath-5.5.8-1.mbs1.x86_64.rpm\n d41522e2a71180202c9ea965ab8bb87d mbs1/x86_64/php-bcompiler-1.0.2-3.1.mbs1.x86_64.rpm\n 22108d55173d81e808601cac8da19528 mbs1/x86_64/php-bitset-2.0-1.mbs1.x86_64.rpm\n 60a5774e783dc9410a3abecd25567242 mbs1/x86_64/php-bloomy-0.1.0-11.1.mbs1.x86_64.rpm\n bf678b9a204be1b978643122de681fa8 mbs1/x86_64/php-braille-0.1.1-1.mbs1.x86_64.rpm\n bb70b7e885f18b80db1ee6738ce3be50 mbs1/x86_64/php-bz2-5.5.8-1.mbs1.x86_64.rpm\n 6d44169948606477f69f70f7ad578f53 mbs1/x86_64/php-cairo-0.3.2-1.mbs1.x86_64.rpm\n 163f88e5a8527945410c21717dc0c523 mbs1/x86_64/php-cairo_wrapper-0.2.4-12.1.mbs1.x86_64.rpm\n bbfb9602746185c2ccee545bda5cea1b mbs1/x86_64/php-calendar-5.5.8-1.mbs1.x86_64.rpm\n 6cd3f73d40196e91b3d5b0d115fd2781 mbs1/x86_64/php-cgi-5.5.8-1.mbs1.x86_64.rpm\n 303f2b6bd21379576c64e9babe78b5a4 mbs1/x86_64/php-cli-5.5.8-1.mbs1.x86_64.rpm\n 1b986fc42ec86b34203557515332cbcb mbs1/x86_64/php-courierauth-0.1.0-26.1.mbs1.x86_64.rpm\n a451399cac0d1eb96c02b82c3682bacb mbs1/x86_64/php-ctype-5.5.8-1.mbs1.x86_64.rpm\n fff5e8e41e8d91ba8f45dc2c2e09de3e mbs1/x86_64/php-curl-5.5.8-1.mbs1.x86_64.rpm\n 9d8d29b7e05ecdb5b209c5f3e9ea11ef mbs1/x86_64/php-cyrus-1.0-30.1.mbs1.x86_64.rpm\n be02c96797fe3505035103a28a646650 mbs1/x86_64/php-dav-1.2-4.1.mbs1.x86_64.rpm\n b1d13d3740cd6d6c80b4ea9f6deccb1f mbs1/x86_64/php-dba-5.5.8-1.mbs1.x86_64.rpm\n 0c1f23ac85aa3da6731cb50877f4933e mbs1/x86_64/php-dbase-5.0.1-3.1.mbs1.x86_64.rpm\n 90a56987be11920d4bd5e435e92dd07e mbs1/x86_64/php-dbx-1.1.2-3.1.mbs1.x86_64.rpm\n f2924a0354eb16c217b5f7ae073df1e7 mbs1/x86_64/php-devel-5.5.8-1.mbs1.x86_64.rpm\n 92a8332882a805d53823f0c950de0d95 mbs1/x86_64/php-dio-0.0.7-1.mbs1.x86_64.rpm\n 18e14cc713ce4e782d3378a6b50739d7 mbs1/x86_64/php-doc-5.5.8-1.mbs1.noarch.rpm\n 19fe234353968902a9095dac4fd4914b mbs1/x86_64/php-dom-5.5.8-1.mbs1.x86_64.rpm\n 3f86006633057b7819cb7ff0109d8bc3 mbs1/x86_64/php-doublemetaphone-1.0.0-1.mbs1.x86_64.rpm\n 1c9d18a83bb590cc398de98529619fbe mbs1/x86_64/php-drizzle-0.4.2-8.1.mbs1.x86_64.rpm\n 681f9d0f04e86b10bcdab85e8ab46646 mbs1/x86_64/php-enchant-5.5.8-1.mbs1.x86_64.rpm\n 86a0fd5715e93fe2ad3af8af9c762f5e mbs1/x86_64/php-event-1.8.1-1.mbs1.x86_64.rpm\n e885e3a1aa38a84f3a91a2f3adfdd9ed mbs1/x86_64/php-exif-5.5.8-1.mbs1.x86_64.rpm\n 28cbec3693e2ec299ae14f4d3aee2bab mbs1/x86_64/php-expect-0.3.1-3.1.mbs1.x86_64.rpm\n 1f6e495022af41702d958c5e4c5a7a0c mbs1/x86_64/php-fam-5.0.1-21.1.mbs1.x86_64.rpm\n dcc659581a3370b6152a0be1c3d4330a mbs1/x86_64/php-fileinfo-5.5.8-1.mbs1.x86_64.rpm\n 51361ea120255c19051acce2f7c52373 mbs1/x86_64/php-filepro-5.1.6-31.1.mbs1.x86_64.rpm\n 57ffefd27baab8189b77ec065f6c25fb mbs1/x86_64/php-filter-5.5.8-1.mbs1.x86_64.rpm\n 40ef3b1acf64c3dbbec30ed053faf91d mbs1/x86_64/php-fpm-5.5.8-1.mbs1.x86_64.rpm\n 585a27ca37d6e425e33ebffda8d4a3c5 mbs1/x86_64/php-ftp-5.5.8-1.mbs1.x86_64.rpm\n f7e17547d06d727435d842566711bd1f mbs1/x86_64/php-gd-5.5.8-1.mbs1.x86_64.rpm\n 424413861017a0d960ec25799f7e6d96 mbs1/x86_64/php-gender-1.0.0-1.mbs1.x86_64.rpm\n 326ce65eb182fa95338b4950bf2902d8 mbs1/x86_64/php-geoip-1.0.8-3.1.mbs1.x86_64.rpm\n e8e5d68ccd220fa1411538c887a9b033 mbs1/x86_64/php-gettext-5.5.8-1.mbs1.x86_64.rpm\n e52ebf9fbb468cc480ff89b16746ac32 mbs1/x86_64/php-gmp-5.5.8-1.mbs1.x86_64.rpm\n 705599e093ed673401b92dcc55d7f7af mbs1/x86_64/php-gnupg-1.3.2-8.1.mbs1.x86_64.rpm\n e3acb8961bcb47b82eae4f2d1f0a5533 mbs1/x86_64/php-gnutls-0.3-0.rc1.25.mbs1.x86_64.rpm\n 63cace0435e5165bb99868f0b77fd0fb mbs1/x86_64/php-gtk2-2.0.3-0.git20130225.1.1.mbs1.x86_64.rpm\n d24ba27252b2d03b1ac45de414ace8f4 mbs1/x86_64/php-haru-1.0.4-1.mbs1.x86_64.rpm\n 69dcad6cd94a553145fc7170eb92b9ab mbs1/x86_64/php-hash-5.5.8-1.mbs1.x86_64.rpm\n 011ee7e7c17f420f6fdddb73f07e2689 mbs1/x86_64/php-hidef-0.1.13-1.mbs1.x86_64.rpm\n 5be11ca2acde72985150182165690a1e mbs1/x86_64/php-htscanner-1.0.1-1.mbs1.x86_64.rpm\n 1ef360e88e9e53f426b6128b352d4498 mbs1/x86_64/php-iconv-5.5.8-1.mbs1.x86_64.rpm\n 241adb52708e8152bbd264477d2c6685 mbs1/x86_64/php-id3-0.2-33.1.mbs1.x86_64.rpm\n 18a9444caba90afd57ac9d349de79592 mbs1/x86_64/php-imagick-3.1.2-1.mbs1.x86_64.rpm\n fb435f0e0c06838e6ba4b8e55edb65da mbs1/x86_64/php-imap-5.5.8-1.mbs1.x86_64.rpm\n e3d4b8b1a34ee2fff2514799d39d6c83 mbs1/x86_64/php-inclued-0.1.3-1.mbs1.x86_64.rpm\n 9a62365f025a6cd92a5649800f94e392 mbs1/x86_64/php-ini-5.5.8-1.mbs1.x86_64.rpm\n cc0fa3dfabc021d0a6f97de624c72451 mbs1/x86_64/php-inotify-0.1.6-1.mbs1.x86_64.rpm\n f7c954f5f7a8c3497244dab0ac9cc874 mbs1/x86_64/php-intl-5.5.8-1.mbs1.x86_64.rpm\n 72104e0ea01d0b8d7025ae3de961d950 mbs1/x86_64/php-json-5.5.8-1.mbs1.x86_64.rpm\n 788d244d7832eca94dc694ec2642c24b mbs1/x86_64/php-ldap-5.5.8-1.mbs1.x86_64.rpm\n ef1754adb00601ab1c4c29bb1fd1ef59 mbs1/x86_64/php-libevent-0.1.0-1.mbs1.x86_64.rpm\n b300a580ba667f6898875fc41d19116f mbs1/x86_64/php-mbstring-5.5.8-1.mbs1.x86_64.rpm\n bb5fecd25651248b7d4731b1aea2b31e mbs1/x86_64/php-mcrypt-5.5.8-1.mbs1.x86_64.rpm\n 299d7d44e160c8b4e5b7f30644c65a67 mbs1/x86_64/php-mcve-7.0.3-11.1.mbs1.x86_64.rpm\n db5be0ea33960859e4f31dc1d8e6c5af mbs1/x86_64/php-memcache-3.0.8-1.mbs1.x86_64.rpm\n bc238ba372583c19c57f658ff4225518 mbs1/x86_64/php-memcached-2.1.0-1.mbs1.x86_64.rpm\n fbd5ebb29764a11aa742e77fde63ec03 mbs1/x86_64/php-mnogosearch-1.96-35.1.mbs1.x86_64.rpm\n 2c0d85ca48d9b1f22f0f8445364f97e5 mbs1/x86_64/php-mongo-1.4.5-1.mbs1.x86_64.rpm\n a87d1de22d52d2e51bb3977a87afb715 mbs1/x86_64/php-mssql-5.5.8-1.mbs1.x86_64.rpm\n c2c1b538550758102b8b456a0db9c18f mbs1/x86_64/php-mysql-5.5.8-1.mbs1.x86_64.rpm\n c09aef537da221b4eebbaad7a893e195 mbs1/x86_64/php-mysqli-5.5.8-1.mbs1.x86_64.rpm\n f50cb148d81ecf786c80661e19714893 mbs1/x86_64/php-mysqlnd-5.5.8-1.mbs1.x86_64.rpm\n 25ca5ff7bb6a4bb39e17bef527a4daec mbs1/x86_64/php-newt-1.2.8-1.mbs1.x86_64.rpm\n 823b8d9b36c8b34b5f80f3f478d5be7d mbs1/x86_64/php-odbc-5.5.8-1.mbs1.x86_64.rpm\n 821f30096996e971be059dcc617beeb4 mbs1/x86_64/php-oggvorbis-0.2-33.1.mbs1.x86_64.rpm\n ec2c830033979609b85d19722079ad45 mbs1/x86_64/php-opcache-5.5.8-1.mbs1.x86_64.rpm\n 0e66afe941f83d77128a0326fea38368 mbs1/x86_64/php-openssl-5.5.8-1.mbs1.x86_64.rpm\n e8b0808df1e75e9eee987d1c38d0de41 mbs1/x86_64/php-pam-1.0.3-10.1.mbs1.x86_64.rpm\n c9772947df6039925dc89ed495c5eea0 mbs1/x86_64/php-pcntl-5.5.8-1.mbs1.x86_64.rpm\n 2d6f78b753dce6b022f0f495e5894bfe mbs1/x86_64/php-pdo-5.5.8-1.mbs1.x86_64.rpm\n 27dd4d459d9c50a3fa5ee81d988e6c4e mbs1/x86_64/php-pdo_dblib-5.5.8-1.mbs1.x86_64.rpm\n 060ad327a9a83ef417f9b0bdd60b7529 mbs1/x86_64/php-pdo_mysql-5.5.8-1.mbs1.x86_64.rpm\n f42d6c75dcd550e902bdda0672407f17 mbs1/x86_64/php-pdo_odbc-5.5.8-1.mbs1.x86_64.rpm\n 0e3764c821f508322e40a779a6694d36 mbs1/x86_64/php-pdo_pgsql-5.5.8-1.mbs1.x86_64.rpm\n af7cc29beea4f7a1aa87f81cc0f42e4d mbs1/x86_64/php-pdo_sqlite-5.5.8-1.mbs1.x86_64.rpm\n 6dc688c04f4a9617f5d9f179d5bffad3 mbs1/x86_64/php-pgsql-5.5.8-1.mbs1.x86_64.rpm\n e9e88947d413f78a0de370b45cd1e581 mbs1/x86_64/php-phar-5.5.8-1.mbs1.x86_64.rpm\n c4cbe315a3897b156de8d8b1ebee2454 mbs1/x86_64/php-posix-5.5.8-1.mbs1.x86_64.rpm\n a22a1d86311d97a6e74f41d4c5cee58a mbs1/x86_64/php-proctitle-0.1.2-1.mbs1.x86_64.rpm\n 1a642e05f7e4acbc0574700d39277f68 mbs1/x86_64/php-radius-1.2.7-1.1.mbs1.x86_64.rpm\n 364d5f30ed13942441cc6728af41f3ce mbs1/x86_64/php-readline-5.5.8-1.mbs1.x86_64.rpm\n 8e09378518bf4efca20b146d2ad3ae18 mbs1/x86_64/php-recode-5.5.8-1.mbs1.x86_64.rpm\n aca1fc497f23bebd1b261a91b4453c83 mbs1/x86_64/php-rrdtool-0-35.1.mbs1.x86_64.rpm\n b7ff902ed02d70049b9fdfa86c82c2bd mbs1/x86_64/php-sasl-0.1.0-36.1.mbs1.x86_64.rpm\n f28d198a8148aa993accca677f3921ce mbs1/x86_64/php-session-5.5.8-1.mbs1.x86_64.rpm\n 9ac8db465023197ca4a3f3358865d6c4 mbs1/x86_64/php-shmop-5.5.8-1.mbs1.x86_64.rpm\n 994c1f4ef6fdbb46a1217a0b4679b540 mbs1/x86_64/php-snmp-5.5.8-1.mbs1.x86_64.rpm\n 122de98493f51dad25fad1bd6490b14d mbs1/x86_64/php-soap-5.5.8-1.mbs1.x86_64.rpm\n 26cb96e64938013375ff2720787dbce3 mbs1/x86_64/php-sockets-5.5.8-1.mbs1.x86_64.rpm\n c03f6d3524750a11a26984a5680b6e31 mbs1/x86_64/php-sqlite-1.0.3-1.mbs1.x86_64.rpm\n cf9b1e1845c4df39e65c721b5ebe1ecd mbs1/x86_64/php-sqlite3-5.5.8-1.mbs1.x86_64.rpm\n 3692df1b43da42070fb2245ba85736d7 mbs1/x86_64/php-ssh2-0.12-1.mbs1.x86_64.rpm\n 46b107eaf4753b6f3e5b1d1c01014ac4 mbs1/x86_64/php-suhosin-0.9.33-7.2.mbs1.x86_64.rpm\n 648fa01ef7b191c206881bc81fc91cae mbs1/x86_64/php-svn-1.0.2-1.mbs1.x86_64.rpm\n 4f76f8fdc2c3b96130b50693f44fb82d mbs1/x86_64/php-swish-0.5.0-1.mbs1.x86_64.rpm\n dcda9398908f302d916e16ac23edc864 mbs1/x86_64/php-sybase_ct-5.5.8-1.mbs1.x86_64.rpm\n 05c262004a13838b354818605091d375 mbs1/x86_64/php-syck-0.9.3-17.1.mbs1.x86_64.rpm\n 911002b84d2ccf6632ab78148eeaa836 mbs1/x86_64/php-sysvmsg-5.5.8-1.mbs1.x86_64.rpm\n 64ee1ae53811450f47ced3dfc180cd3b mbs1/x86_64/php-sysvsem-5.5.8-1.mbs1.x86_64.rpm\n 8822eff6601523af2aec8a4b40278d5c mbs1/x86_64/php-sysvshm-5.5.8-1.mbs1.x86_64.rpm\n cb7122e7b2b81860304578978b20fae4 mbs1/x86_64/php-tcpwrap-1.1.3-18.1.mbs1.x86_64.rpm\n dd20d26681b253ca10d226b576cd9da7 mbs1/x86_64/php-tdb-1.0.0-18.1.mbs1.x86_64.rpm\n 89ca00e2d6b8a0655161caf3d975a29c mbs1/x86_64/php-tidy-5.5.8-1.mbs1.x86_64.rpm\n 63e583090b7d6e86679d9cf4dadd13b8 mbs1/x86_64/php-timezonedb-2013.9-1.1.mbs1.x86_64.rpm\n 51abf076f5d22b0393f94d74bf384502 mbs1/x86_64/php-tk-0.1.1-29.1.mbs1.x86_64.rpm\n a2a8c303e251afdfd6b6eb84307f95cd mbs1/x86_64/php-tokenizer-5.5.8-1.mbs1.x86_64.rpm\n 2d6a9a2ee9034ca19c81914f10dbaaf1 mbs1/x86_64/php-txforward-1.0.7-3.1.mbs1.x86_64.rpm\n a91cc0a9f98d6be93242c761722c3363 mbs1/x86_64/php-uploadprogress-1.0.3.1-3.1.mbs1.x86_64.rpm\n 4cad056354849adc02de0899481f2c0e mbs1/x86_64/php-uuid-1.0.3-1.mbs1.x86_64.rpm\n 269b8bdd1a21e7f7688a60cb6d4e66c9 mbs1/x86_64/php-wbxml-1.0.3-14.1.mbs1.x86_64.rpm\n 3c324e3865d37e40e0c44d703e6af971 mbs1/x86_64/php-wddx-5.5.8-1.mbs1.x86_64.rpm\n 272928a998127f03fa7b466bdae5625b mbs1/x86_64/php-xattr-1.2.0-1.mbs1.x86_64.rpm\n 1a36dc739e5b59e1a7234c20252bb30c mbs1/x86_64/php-xdiff-1.5.2-1.mbs1.x86_64.rpm\n e21b93c47fc09d426b1e9873d922c9b6 mbs1/x86_64/php-xml-5.5.8-1.mbs1.x86_64.rpm\n 18b1f4b35359ef4803840b6a59023662 mbs1/x86_64/php-xmlreader-5.5.8-1.mbs1.x86_64.rpm\n 32cac8722f385bd6c889c7998708f896 mbs1/x86_64/php-xmlrpc-5.5.8-1.mbs1.x86_64.rpm\n 17741808a8ab423b918e15d791a470a0 mbs1/x86_64/php-xmlwriter-5.5.8-1.mbs1.x86_64.rpm\n c4ca4a667ea3d67c2a5f41be43e275ef mbs1/x86_64/php-xsl-5.5.8-1.mbs1.x86_64.rpm\n 26c7a4cb6e3a349f184cb151b3e66bbe mbs1/x86_64/php-xslcache-0.7.2-1.mbs1.x86_64.rpm\n 2ec0a54234ba1f9408a1dfc312ce15bb mbs1/x86_64/php-yaml-1.1.1-1.mbs1.x86_64.rpm\n d8d867f694f761e0c1fbb42f37671246 mbs1/x86_64/php-yaz-1.1.6-1.mbs1.x86_64.rpm\n d3a22538565c0e70823ab006a918b599 mbs1/x86_64/php-yp-5.2.3-25.1.mbs1.x86_64.rpm\n e8a6f6b750a57d30cab05f43ed0d2826 mbs1/x86_64/php-zip-5.5.8-1.mbs1.x86_64.rpm\n 85fc2115c2d73651c13b7e7d579035c2 mbs1/x86_64/php-zlib-5.5.8-1.mbs1.x86_64.rpm \n dffedeb2bc9dbcf09a08c5b8ee085241 mbs1/SRPMS/json-c-0.11-1.mbs1.src.rpm\n af6e8a771ad6e82cc4890d017a282a54 mbs1/SRPMS/libmbfl-1.2.0-1.mbs1.src.rpm\n 208cadf784cf7e5d87473a66b1ad9dec mbs1/SRPMS/php-5.5.8-1.mbs1.src.rpm\n 569fe67ccfe844b44d66cd5801c87029 mbs1/SRPMS/php-amf-0.9.2-10.1.mbs1.src.rpm\n 18c40965301ed883fdc24604257cd1e5 mbs1/SRPMS/php-apacheaccessor-1.0.1-1.mbs1.src.rpm\n f7450092f00a1271e4c767317739caf9 mbs1/SRPMS/php-apc-3.1.15-1.2.mbs1.src.rpm\n 05ac57db5fca564a1056dfbaffb98a5e mbs1/SRPMS/php-apm-1.1.0-1RC2.mbs1.src.rpm\n 92d6548693ee63aa19a50bf8662db4b1 mbs1/SRPMS/php-archive-0.2-22.1.mbs1.src.rpm\n 937fe1748c3a85337d74d9d25a5f64b2 mbs1/SRPMS/php-auth_nds-2.2.6-28.1.mbs1.src.rpm\n 73b13a0ed1ef4c11411c8482d924346a mbs1/SRPMS/php-bbcode-1.0.3-0.0.b1.5.mbs1.src.rpm\n 2e6d69003f3b782b4dd304a7fb7838d6 mbs1/SRPMS/php-bcompiler-1.0.2-3.1.mbs1.src.rpm\n 0514e5ace4b598d1f2f380eee232d906 mbs1/SRPMS/php-bitset-2.0-1.mbs1.src.rpm\n f681295764f84a253a17a6f8f0de66f3 mbs1/SRPMS/php-bloomy-0.1.0-11.1.mbs1.src.rpm\n f099bc978799afff5ed4ab35cde70633 mbs1/SRPMS/php-braille-0.1.1-1.mbs1.src.rpm\n 522cd2c8a16f78acdc7dc5f80fff34e4 mbs1/SRPMS/php-cairo-0.3.2-1.mbs1.src.rpm\n 56436636c2f04d70a96d6cb571abcf03 mbs1/SRPMS/php-cairo_wrapper-0.2.4-12.1.mbs1.src.rpm\n 16e205bc0339a90acb9560df409be2f7 mbs1/SRPMS/php-courierauth-0.1.0-26.1.mbs1.src.rpm\n fc4f8967c11cc4b2080193ea11439f10 mbs1/SRPMS/php-cyrus-1.0-30.1.mbs1.src.rpm\n 028cd11a27d1caf3fa0bfb7ccba72dff mbs1/SRPMS/php-dav-1.2-4.1.mbs1.src.rpm\n 6e7fa7b114c2262288d12b16b67f9398 mbs1/SRPMS/php-dbase-5.0.1-3.1.mbs1.src.rpm\n f5a32e8c86e6d8a37ea49f6edcc8f2eb mbs1/SRPMS/php-dbx-1.1.2-3.1.mbs1.src.rpm\n 28361b8014ef86de714370ed2f9c8523 mbs1/SRPMS/php-dio-0.0.7-1.mbs1.src.rpm\n 46cd6b2052a284a5e4b6cd2e9ce0f35b mbs1/SRPMS/php-doublemetaphone-1.0.0-1.mbs1.src.rpm\n 216f54099506165d92e2fa5eb5fa895b mbs1/SRPMS/php-drizzle-0.4.2-8.1.mbs1.src.rpm\n 8103618186a8263b5aa140ac2604a377 mbs1/SRPMS/php-event-1.8.1-1.mbs1.src.rpm\n 117870df2707a9f7f743e0d5e006f01c mbs1/SRPMS/php-expect-0.3.1-3.1.mbs1.src.rpm\n 1e9571e84f5c216436346ba4f0ef7e01 mbs1/SRPMS/php-fam-5.0.1-21.1.mbs1.src.rpm\n 12ab1fab99d150362d41a2462432616f mbs1/SRPMS/php-filepro-5.1.6-31.1.mbs1.src.rpm\n b8f3eeac43f32ffab74d3a6a2e1a95a9 mbs1/SRPMS/php-gender-1.0.0-1.mbs1.src.rpm\n f4b01e4ea76567f29b6302a94de0187e mbs1/SRPMS/php-geoip-1.0.8-3.1.mbs1.src.rpm\n ad38f3ef3e39a2cc1ff974fb6fee5f27 mbs1/SRPMS/php-gnupg-1.3.2-8.1.mbs1.src.rpm\n 7993893485eed60a687dd9072e58ceb7 mbs1/SRPMS/php-gnutls-0.3-0.rc1.25.mbs1.src.rpm\n 93667de0345b12d30fd9a90850ccfa64 mbs1/SRPMS/php-gtk2-2.0.3-0.git20130225.1.1.mbs1.src.rpm\n 05bf2145f513bfa34f36e60032d752c1 mbs1/SRPMS/php-haru-1.0.4-1.mbs1.src.rpm\n efc0bfbf4490ea6bf61464fcc397661e mbs1/SRPMS/php-hidef-0.1.13-1.mbs1.src.rpm\n 4c4dcf9335bab8530c2b5a8f5d07fdf5 mbs1/SRPMS/php-htscanner-1.0.1-1.mbs1.src.rpm\n 4d39a950797e8df46762c5c73e170179 mbs1/SRPMS/php-id3-0.2-33.1.mbs1.src.rpm\n 1a756001cd773cdc7ca5f797e7171660 mbs1/SRPMS/php-imagick-3.1.2-1.mbs1.src.rpm\n 7fd6af5d9de5290b131e9624ec67b6bc mbs1/SRPMS/php-inclued-0.1.3-1.mbs1.src.rpm\n 57ca03ec85af8be4d4db50843d7adeb4 mbs1/SRPMS/php-inotify-0.1.6-1.mbs1.src.rpm\n 58c4db8af664a6790e382575b8b39151 mbs1/SRPMS/php-libevent-0.1.0-1.mbs1.src.rpm\n fde733df58d1daf042d0948be090e961 mbs1/SRPMS/php-mcve-7.0.3-11.1.mbs1.src.rpm\n 9340b22c4c7b2c5071c197c8fe22aa02 mbs1/SRPMS/php-memcache-3.0.8-1.mbs1.src.rpm\n a9c5cbd1eeab91714ec8ce69106e1a20 mbs1/SRPMS/php-memcached-2.1.0-1.mbs1.src.rpm\n 6cd241db51c9f1e51bc81e2dfecb485b mbs1/SRPMS/php-mnogosearch-1.96-35.1.mbs1.src.rpm\n 98d85dfb93b0a0c269a9a2d3f6f0eede mbs1/SRPMS/php-mongo-1.4.5-1.mbs1.src.rpm\n 2524e31d5a61e1352dce360526149544 mbs1/SRPMS/php-newt-1.2.8-1.mbs1.src.rpm\n b117d574a2eb07efbeef7e68eb3dbf38 mbs1/SRPMS/php-oggvorbis-0.2-33.1.mbs1.src.rpm\n 25eef544c81b44775441da1a9d4a5f8e mbs1/SRPMS/php-pam-1.0.3-10.1.mbs1.src.rpm\n e4812e2fb71334c1470855047d33ff92 mbs1/SRPMS/php-proctitle-0.1.2-1.mbs1.src.rpm\n b34e461b5688ed89bcde35f46d34615a mbs1/SRPMS/php-radius-1.2.7-1.1.mbs1.src.rpm\n 40dbef246efb480f12286479828f0172 mbs1/SRPMS/php-rrdtool-0-35.1.mbs1.src.rpm\n 60701f0629317b0bec9f1bdd43354e19 mbs1/SRPMS/php-sasl-0.1.0-36.1.mbs1.src.rpm\n 5a75e8c81e606385c707b714b6282e5a mbs1/SRPMS/php-sqlite-1.0.3-1.mbs1.src.rpm\n ca0c2cf7daea363b6dbe0b1ef89982c1 mbs1/SRPMS/php-ssh2-0.12-1.mbs1.src.rpm\n 2df05fb13a6318aa63d52b58018aaac9 mbs1/SRPMS/php-suhosin-0.9.33-7.2.mbs1.src.rpm\n 9a9ab66c2049d3b901a1a29cb41866fc mbs1/SRPMS/php-svn-1.0.2-1.mbs1.src.rpm\n 62182c75a65d16872febeb225d345f40 mbs1/SRPMS/php-swish-0.5.0-1.mbs1.src.rpm\n fdb525c5d728fb5058edc0bde32f8207 mbs1/SRPMS/php-syck-0.9.3-17.1.mbs1.src.rpm\n fdc70578239b8ad71a29d2164346b2e3 mbs1/SRPMS/php-tcpwrap-1.1.3-18.1.mbs1.src.rpm\n 7eca5e164fe2c13313d24fa2d9192b2f mbs1/SRPMS/php-tdb-1.0.0-18.1.mbs1.src.rpm\n d9b8b9498a693a047250431b387d1a38 mbs1/SRPMS/php-timezonedb-2013.9-1.1.mbs1.src.rpm\n 05f98d011308f8e5b93678bc6f8131de mbs1/SRPMS/php-tk-0.1.1-29.1.mbs1.src.rpm\n cf608a75bbbaea51c1ce0b04719ce746 mbs1/SRPMS/php-txforward-1.0.7-3.1.mbs1.src.rpm\n 4a1bae8e064b076164b81d5e79bd5e4b mbs1/SRPMS/php-uploadprogress-1.0.3.1-3.1.mbs1.src.rpm\n 23a9cf1fa7db9dc8843c9262795a1eb1 mbs1/SRPMS/php-uuid-1.0.3-1.mbs1.src.rpm\n f1c54907e7c544dfd95764da8175f749 mbs1/SRPMS/php-wbxml-1.0.3-14.1.mbs1.src.rpm\n 2c57275de2451e91cbfc271ae14595dc mbs1/SRPMS/php-xattr-1.2.0-1.mbs1.src.rpm\n 82d034516dcfe4fbaf68640ccd017a1f mbs1/SRPMS/php-xdiff-1.5.2-1.mbs1.src.rpm\n c19da5f5199dbc4d58a2c1d9b7de5bff mbs1/SRPMS/php-xslcache-0.7.2-1.mbs1.src.rpm\n b05fbb9a7a6ca882fcb7ed4cab1c3886 mbs1/SRPMS/php-yaml-1.1.1-1.mbs1.src.rpm\n b2859baaf205be29a938df103529659d mbs1/SRPMS/php-yaz-1.1.6-1.mbs1.src.rpm\n 8544a9059f4099bc17bdd31cb2218aee mbs1/SRPMS/php-yp-5.2.3-25.1.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. ============================================================================\nUbuntu Security Notice USN-2055-1\nDecember 12, 2013\n\nphp5 vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 13.10\n- Ubuntu 13.04\n- Ubuntu 12.10\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in PHP. (CVE-2013-6420)\n\nIt was discovered that PHP incorrectly handled DateInterval objects. (CVE-2013-6712)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 13.10:\n libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.1\n php5-cgi 5.5.3+dfsg-1ubuntu2.1\n php5-cli 5.5.3+dfsg-1ubuntu2.1\n\nUbuntu 13.04:\n libapache2-mod-php5 5.4.9-4ubuntu2.4\n php5-cgi 5.4.9-4ubuntu2.4\n php5-cli 5.4.9-4ubuntu2.4\n\nUbuntu 12.10:\n libapache2-mod-php5 5.4.6-1ubuntu1.5\n php5-cgi 5.4.6-1ubuntu1.5\n php5-cli 5.4.6-1ubuntu1.5\n\nUbuntu 12.04 LTS:\n libapache2-mod-php5 5.3.10-1ubuntu3.9\n php5-cgi 5.3.10-1ubuntu3.9\n php5-cli 5.3.10-1ubuntu3.9\n\nUbuntu 10.04 LTS:\n libapache2-mod-php5 5.3.2-1ubuntu4.22\n php5-cgi 5.3.2-1ubuntu4.22\n php5-cli 5.3.2-1ubuntu4.22\n\nIn general, a standard system update will make all the necessary changes. \n\nRelease Date: 2014-09-30\nLast Updated: 2014-09-30\n\nPotential Security Impact: Cross-site scripting (XSS), Cross-site Request\nForgery (CSRF), unauthorized disclosure of information, Denial of Service\n(DoS), and Clickjacking\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH) on Linux and Windows. The vulnerabilities could be\nexploited remotely resulting in Cross-site Scripting (XSS), Cross-site\nRequest Forgery (CSRF), unauthorized disclosure of information, Denial of\nService (DoS), and Clickjacking. \n\nReferences:\n\nCVE-2013-4545 Unauthorized modification\nCVE-2013-6420 (SSRT101447) Unauthorized disclosure of information\nCVE-2013-6422 Unauthorized disclosure of information\nCVE-2013-6712 (SSRT101447) Denial of Service (DoS)\nCVE-2014-2640 (SSRT101633, SSRT101438) Cross-site Scripting (XSS)\nCVE-2014-2641 (SSRT101438) Cross-site Request Forgery (CSRF)\nCVE-2014-2642 (SSRT101701) Clickjacking\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP System Management Homepage (SMH) for Linux and Windows prior to version\n7.4\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-4545 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2013-6420 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2013-6422 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0\nCVE-2013-6712 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2014-2640 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2014-2641 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0\nCVE-2014-2642 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following software updates available to resolve the\nvulnerabilities for the impacted versions of HP System Management Homepage\n(SMH) for Linux and Windows:\n\nhttp://h18013.www1.hp.com/products/servers/management/agents/\n\nHISTORY\nVersion:1 (rev.1) - 30 September 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: php53 and php security update\nAdvisory ID: RHSA-2014:1012-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1012.html\nIssue date: 2014-08-06\nCVE Names: CVE-2012-1571 CVE-2013-6712 CVE-2014-0237 \n CVE-2014-0238 CVE-2014-1943 CVE-2014-2270 \n CVE-2014-3479 CVE-2014-3480 CVE-2014-3515 \n CVE-2014-4049 CVE-2014-4721 \n=====================================================================\n\n1. Summary:\n\nUpdated php53 and php packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 respectively. \n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nPHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server. PHP\u0027s fileinfo module provides functions used to identify a\nparticular file according to the type of data contained by the file. \n\nMultiple denial of service flaws were found in the way the File Information\n(fileinfo) extension parsed certain Composite Document Format (CDF) files. \nA remote attacker could use either of these flaws to crash a PHP\napplication using fileinfo via a specially crafted CDF file. \n(CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, CVE-2012-1571)\n\nTwo denial of service flaws were found in the way the File Information\n(fileinfo) extension handled indirect and search rules. A remote attacker\ncould use either of these flaws to cause a PHP application using fileinfo\nto crash or consume an excessive amount of CPU. (CVE-2014-1943,\nCVE-2014-2270)\n\nA heap-based buffer overflow flaw was found in the way PHP parsed DNS TXT\nrecords. A malicious DNS server or a man-in-the-middle attacker could\npossibly use this flaw to execute arbitrary code as the PHP interpreter if\na PHP application used the dns_get_record() function to perform a DNS\nquery. (CVE-2014-4049)\n\nA type confusion issue was found in PHP\u0027s phpinfo() function. A malicious\nscript author could possibly use this flaw to disclose certain portions of\nserver memory. (CVE-2014-4721)\n\nA buffer over-read flaw was found in the way the DateInterval class parsed\ninterval specifications. An attacker able to make a PHP application parse a\nspecially crafted specification using DateInterval could possibly cause the\nPHP interpreter to crash. (CVE-2013-6712)\n\nA type confusion issue was found in the SPL ArrayObject and\nSPLObjectStorage classes\u0027 unserialize() method. A remote attacker able to\nsubmit specially crafted input to a PHP application, which would then\nunserialize this input using one of the aforementioned methods, could use\nthis flaw to execute arbitrary code with the privileges of the user running\nthat PHP application. (CVE-2014-3515)\n\nThe CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, and CVE-2014-3480 issues\nwere discovered by Francisco Alonso of Red Hat Product Security. \n\nAll php53 and php users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n805197 - CVE-2012-1571 file: out of bounds read in CDF parser\n1035670 - CVE-2013-6712 php: heap-based buffer over-read in DateInterval\n1065836 - CVE-2014-1943 file: unrestricted recursion in handling of indirect type rules\n1072220 - CVE-2014-2270 file: out-of-bounds access in search rules with offsets from input file\n1098155 - CVE-2014-0238 file: CDF property info parsing nelements infinite loop\n1098193 - CVE-2014-0237 file: cdf_unpack_summary_info() excessive looping DoS\n1104858 - CVE-2014-3480 file: cdf_count_chain insufficient boundary check\n1104869 - CVE-2014-3479 file: cdf_check_stream_offset insufficient boundary check\n1108447 - CVE-2014-4049 php: heap-based buffer overflow in DNS TXT record parsing\n1112154 - CVE-2014-3515 php: unserialize() SPL ArrayObject / SPLObjectStorage type confusion flaw\n1116662 - CVE-2014-4721 php: type confusion issue in phpinfo() leading to information leak\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop Workstation (v. 5 client):\n\nSource:\nphp53-5.3.3-23.el5_10.src.rpm\n\ni386:\nphp53-5.3.3-23.el5_10.i386.rpm\nphp53-bcmath-5.3.3-23.el5_10.i386.rpm\nphp53-cli-5.3.3-23.el5_10.i386.rpm\nphp53-common-5.3.3-23.el5_10.i386.rpm\nphp53-dba-5.3.3-23.el5_10.i386.rpm\nphp53-debuginfo-5.3.3-23.el5_10.i386.rpm\nphp53-devel-5.3.3-23.el5_10.i386.rpm\nphp53-gd-5.3.3-23.el5_10.i386.rpm\nphp53-imap-5.3.3-23.el5_10.i386.rpm\nphp53-intl-5.3.3-23.el5_10.i386.rpm\nphp53-ldap-5.3.3-23.el5_10.i386.rpm\nphp53-mbstring-5.3.3-23.el5_10.i386.rpm\nphp53-mysql-5.3.3-23.el5_10.i386.rpm\nphp53-odbc-5.3.3-23.el5_10.i386.rpm\nphp53-pdo-5.3.3-23.el5_10.i386.rpm\nphp53-pgsql-5.3.3-23.el5_10.i386.rpm\nphp53-process-5.3.3-23.el5_10.i386.rpm\nphp53-pspell-5.3.3-23.el5_10.i386.rpm\nphp53-snmp-5.3.3-23.el5_10.i386.rpm\nphp53-soap-5.3.3-23.el5_10.i386.rpm\nphp53-xml-5.3.3-23.el5_10.i386.rpm\nphp53-xmlrpc-5.3.3-23.el5_10.i386.rpm\n\nx86_64:\nphp53-5.3.3-23.el5_10.x86_64.rpm\nphp53-bcmath-5.3.3-23.el5_10.x86_64.rpm\nphp53-cli-5.3.3-23.el5_10.x86_64.rpm\nphp53-common-5.3.3-23.el5_10.x86_64.rpm\nphp53-dba-5.3.3-23.el5_10.x86_64.rpm\nphp53-debuginfo-5.3.3-23.el5_10.x86_64.rpm\nphp53-devel-5.3.3-23.el5_10.x86_64.rpm\nphp53-gd-5.3.3-23.el5_10.x86_64.rpm\nphp53-imap-5.3.3-23.el5_10.x86_64.rpm\nphp53-intl-5.3.3-23.el5_10.x86_64.rpm\nphp53-ldap-5.3.3-23.el5_10.x86_64.rpm\nphp53-mbstring-5.3.3-23.el5_10.x86_64.rpm\nphp53-mysql-5.3.3-23.el5_10.x86_64.rpm\nphp53-odbc-5.3.3-23.el5_10.x86_64.rpm\nphp53-pdo-5.3.3-23.el5_10.x86_64.rpm\nphp53-pgsql-5.3.3-23.el5_10.x86_64.rpm\nphp53-process-5.3.3-23.el5_10.x86_64.rpm\nphp53-pspell-5.3.3-23.el5_10.x86_64.rpm\nphp53-snmp-5.3.3-23.el5_10.x86_64.rpm\nphp53-soap-5.3.3-23.el5_10.x86_64.rpm\nphp53-xml-5.3.3-23.el5_10.x86_64.rpm\nphp53-xmlrpc-5.3.3-23.el5_10.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nphp53-5.3.3-23.el5_10.src.rpm\n\ni386:\nphp53-5.3.3-23.el5_10.i386.rpm\nphp53-bcmath-5.3.3-23.el5_10.i386.rpm\nphp53-cli-5.3.3-23.el5_10.i386.rpm\nphp53-common-5.3.3-23.el5_10.i386.rpm\nphp53-dba-5.3.3-23.el5_10.i386.rpm\nphp53-debuginfo-5.3.3-23.el5_10.i386.rpm\nphp53-devel-5.3.3-23.el5_10.i386.rpm\nphp53-gd-5.3.3-23.el5_10.i386.rpm\nphp53-imap-5.3.3-23.el5_10.i386.rpm\nphp53-intl-5.3.3-23.el5_10.i386.rpm\nphp53-ldap-5.3.3-23.el5_10.i386.rpm\nphp53-mbstring-5.3.3-23.el5_10.i386.rpm\nphp53-mysql-5.3.3-23.el5_10.i386.rpm\nphp53-odbc-5.3.3-23.el5_10.i386.rpm\nphp53-pdo-5.3.3-23.el5_10.i386.rpm\nphp53-pgsql-5.3.3-23.el5_10.i386.rpm\nphp53-process-5.3.3-23.el5_10.i386.rpm\nphp53-pspell-5.3.3-23.el5_10.i386.rpm\nphp53-snmp-5.3.3-23.el5_10.i386.rpm\nphp53-soap-5.3.3-23.el5_10.i386.rpm\nphp53-xml-5.3.3-23.el5_10.i386.rpm\nphp53-xmlrpc-5.3.3-23.el5_10.i386.rpm\n\nia64:\nphp53-5.3.3-23.el5_10.ia64.rpm\nphp53-bcmath-5.3.3-23.el5_10.ia64.rpm\nphp53-cli-5.3.3-23.el5_10.ia64.rpm\nphp53-common-5.3.3-23.el5_10.ia64.rpm\nphp53-dba-5.3.3-23.el5_10.ia64.rpm\nphp53-debuginfo-5.3.3-23.el5_10.ia64.rpm\nphp53-devel-5.3.3-23.el5_10.ia64.rpm\nphp53-gd-5.3.3-23.el5_10.ia64.rpm\nphp53-imap-5.3.3-23.el5_10.ia64.rpm\nphp53-intl-5.3.3-23.el5_10.ia64.rpm\nphp53-ldap-5.3.3-23.el5_10.ia64.rpm\nphp53-mbstring-5.3.3-23.el5_10.ia64.rpm\nphp53-mysql-5.3.3-23.el5_10.ia64.rpm\nphp53-odbc-5.3.3-23.el5_10.ia64.rpm\nphp53-pdo-5.3.3-23.el5_10.ia64.rpm\nphp53-pgsql-5.3.3-23.el5_10.ia64.rpm\nphp53-process-5.3.3-23.el5_10.ia64.rpm\nphp53-pspell-5.3.3-23.el5_10.ia64.rpm\nphp53-snmp-5.3.3-23.el5_10.ia64.rpm\nphp53-soap-5.3.3-23.el5_10.ia64.rpm\nphp53-xml-5.3.3-23.el5_10.ia64.rpm\nphp53-xmlrpc-5.3.3-23.el5_10.ia64.rpm\n\nppc:\nphp53-5.3.3-23.el5_10.ppc.rpm\nphp53-bcmath-5.3.3-23.el5_10.ppc.rpm\nphp53-cli-5.3.3-23.el5_10.ppc.rpm\nphp53-common-5.3.3-23.el5_10.ppc.rpm\nphp53-dba-5.3.3-23.el5_10.ppc.rpm\nphp53-debuginfo-5.3.3-23.el5_10.ppc.rpm\nphp53-devel-5.3.3-23.el5_10.ppc.rpm\nphp53-gd-5.3.3-23.el5_10.ppc.rpm\nphp53-imap-5.3.3-23.el5_10.ppc.rpm\nphp53-intl-5.3.3-23.el5_10.ppc.rpm\nphp53-ldap-5.3.3-23.el5_10.ppc.rpm\nphp53-mbstring-5.3.3-23.el5_10.ppc.rpm\nphp53-mysql-5.3.3-23.el5_10.ppc.rpm\nphp53-odbc-5.3.3-23.el5_10.ppc.rpm\nphp53-pdo-5.3.3-23.el5_10.ppc.rpm\nphp53-pgsql-5.3.3-23.el5_10.ppc.rpm\nphp53-process-5.3.3-23.el5_10.ppc.rpm\nphp53-pspell-5.3.3-23.el5_10.ppc.rpm\nphp53-snmp-5.3.3-23.el5_10.ppc.rpm\nphp53-soap-5.3.3-23.el5_10.ppc.rpm\nphp53-xml-5.3.3-23.el5_10.ppc.rpm\nphp53-xmlrpc-5.3.3-23.el5_10.ppc.rpm\n\ns390x:\nphp53-5.3.3-23.el5_10.s390x.rpm\nphp53-bcmath-5.3.3-23.el5_10.s390x.rpm\nphp53-cli-5.3.3-23.el5_10.s390x.rpm\nphp53-common-5.3.3-23.el5_10.s390x.rpm\nphp53-dba-5.3.3-23.el5_10.s390x.rpm\nphp53-debuginfo-5.3.3-23.el5_10.s390x.rpm\nphp53-devel-5.3.3-23.el5_10.s390x.rpm\nphp53-gd-5.3.3-23.el5_10.s390x.rpm\nphp53-imap-5.3.3-23.el5_10.s390x.rpm\nphp53-intl-5.3.3-23.el5_10.s390x.rpm\nphp53-ldap-5.3.3-23.el5_10.s390x.rpm\nphp53-mbstring-5.3.3-23.el5_10.s390x.rpm\nphp53-mysql-5.3.3-23.el5_10.s390x.rpm\nphp53-odbc-5.3.3-23.el5_10.s390x.rpm\nphp53-pdo-5.3.3-23.el5_10.s390x.rpm\nphp53-pgsql-5.3.3-23.el5_10.s390x.rpm\nphp53-process-5.3.3-23.el5_10.s390x.rpm\nphp53-pspell-5.3.3-23.el5_10.s390x.rpm\nphp53-snmp-5.3.3-23.el5_10.s390x.rpm\nphp53-soap-5.3.3-23.el5_10.s390x.rpm\nphp53-xml-5.3.3-23.el5_10.s390x.rpm\nphp53-xmlrpc-5.3.3-23.el5_10.s390x.rpm\n\nx86_64:\nphp53-5.3.3-23.el5_10.x86_64.rpm\nphp53-bcmath-5.3.3-23.el5_10.x86_64.rpm\nphp53-cli-5.3.3-23.el5_10.x86_64.rpm\nphp53-common-5.3.3-23.el5_10.x86_64.rpm\nphp53-dba-5.3.3-23.el5_10.x86_64.rpm\nphp53-debuginfo-5.3.3-23.el5_10.x86_64.rpm\nphp53-devel-5.3.3-23.el5_10.x86_64.rpm\nphp53-gd-5.3.3-23.el5_10.x86_64.rpm\nphp53-imap-5.3.3-23.el5_10.x86_64.rpm\nphp53-intl-5.3.3-23.el5_10.x86_64.rpm\nphp53-ldap-5.3.3-23.el5_10.x86_64.rpm\nphp53-mbstring-5.3.3-23.el5_10.x86_64.rpm\nphp53-mysql-5.3.3-23.el5_10.x86_64.rpm\nphp53-odbc-5.3.3-23.el5_10.x86_64.rpm\nphp53-pdo-5.3.3-23.el5_10.x86_64.rpm\nphp53-pgsql-5.3.3-23.el5_10.x86_64.rpm\nphp53-process-5.3.3-23.el5_10.x86_64.rpm\nphp53-pspell-5.3.3-23.el5_10.x86_64.rpm\nphp53-snmp-5.3.3-23.el5_10.x86_64.rpm\nphp53-soap-5.3.3-23.el5_10.x86_64.rpm\nphp53-xml-5.3.3-23.el5_10.x86_64.rpm\nphp53-xmlrpc-5.3.3-23.el5_10.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nphp-5.3.3-27.el6_5.1.src.rpm\n\ni386:\nphp-5.3.3-27.el6_5.1.i686.rpm\nphp-bcmath-5.3.3-27.el6_5.1.i686.rpm\nphp-cli-5.3.3-27.el6_5.1.i686.rpm\nphp-common-5.3.3-27.el6_5.1.i686.rpm\nphp-dba-5.3.3-27.el6_5.1.i686.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.i686.rpm\nphp-devel-5.3.3-27.el6_5.1.i686.rpm\nphp-embedded-5.3.3-27.el6_5.1.i686.rpm\nphp-enchant-5.3.3-27.el6_5.1.i686.rpm\nphp-fpm-5.3.3-27.el6_5.1.i686.rpm\nphp-gd-5.3.3-27.el6_5.1.i686.rpm\nphp-imap-5.3.3-27.el6_5.1.i686.rpm\nphp-intl-5.3.3-27.el6_5.1.i686.rpm\nphp-ldap-5.3.3-27.el6_5.1.i686.rpm\nphp-mbstring-5.3.3-27.el6_5.1.i686.rpm\nphp-mysql-5.3.3-27.el6_5.1.i686.rpm\nphp-odbc-5.3.3-27.el6_5.1.i686.rpm\nphp-pdo-5.3.3-27.el6_5.1.i686.rpm\nphp-pgsql-5.3.3-27.el6_5.1.i686.rpm\nphp-process-5.3.3-27.el6_5.1.i686.rpm\nphp-pspell-5.3.3-27.el6_5.1.i686.rpm\nphp-recode-5.3.3-27.el6_5.1.i686.rpm\nphp-snmp-5.3.3-27.el6_5.1.i686.rpm\nphp-soap-5.3.3-27.el6_5.1.i686.rpm\nphp-tidy-5.3.3-27.el6_5.1.i686.rpm\nphp-xml-5.3.3-27.el6_5.1.i686.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.i686.rpm\nphp-zts-5.3.3-27.el6_5.1.i686.rpm\n\nx86_64:\nphp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-bcmath-5.3.3-27.el6_5.1.x86_64.rpm\nphp-cli-5.3.3-27.el6_5.1.x86_64.rpm\nphp-common-5.3.3-27.el6_5.1.x86_64.rpm\nphp-dba-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-devel-5.3.3-27.el6_5.1.x86_64.rpm\nphp-embedded-5.3.3-27.el6_5.1.x86_64.rpm\nphp-enchant-5.3.3-27.el6_5.1.x86_64.rpm\nphp-fpm-5.3.3-27.el6_5.1.x86_64.rpm\nphp-gd-5.3.3-27.el6_5.1.x86_64.rpm\nphp-imap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-intl-5.3.3-27.el6_5.1.x86_64.rpm\nphp-ldap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mbstring-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mysql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-odbc-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pdo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pgsql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-process-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pspell-5.3.3-27.el6_5.1.x86_64.rpm\nphp-recode-5.3.3-27.el6_5.1.x86_64.rpm\nphp-snmp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-soap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-tidy-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xml-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm\nphp-zts-5.3.3-27.el6_5.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nphp-5.3.3-27.el6_5.1.src.rpm\n\nx86_64:\nphp-cli-5.3.3-27.el6_5.1.x86_64.rpm\nphp-common-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nphp-5.3.3-27.el6_5.1.src.rpm\n\nx86_64:\nphp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-bcmath-5.3.3-27.el6_5.1.x86_64.rpm\nphp-dba-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-devel-5.3.3-27.el6_5.1.x86_64.rpm\nphp-embedded-5.3.3-27.el6_5.1.x86_64.rpm\nphp-enchant-5.3.3-27.el6_5.1.x86_64.rpm\nphp-fpm-5.3.3-27.el6_5.1.x86_64.rpm\nphp-gd-5.3.3-27.el6_5.1.x86_64.rpm\nphp-imap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-intl-5.3.3-27.el6_5.1.x86_64.rpm\nphp-ldap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mbstring-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mysql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-odbc-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pdo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pgsql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-process-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pspell-5.3.3-27.el6_5.1.x86_64.rpm\nphp-recode-5.3.3-27.el6_5.1.x86_64.rpm\nphp-snmp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-soap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-tidy-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xml-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm\nphp-zts-5.3.3-27.el6_5.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nphp-5.3.3-27.el6_5.1.src.rpm\n\ni386:\nphp-5.3.3-27.el6_5.1.i686.rpm\nphp-cli-5.3.3-27.el6_5.1.i686.rpm\nphp-common-5.3.3-27.el6_5.1.i686.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.i686.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.i686.rpm\nphp-gd-5.3.3-27.el6_5.1.i686.rpm\nphp-gd-5.3.3-27.el6_5.1.i686.rpm\nphp-ldap-5.3.3-27.el6_5.1.i686.rpm\nphp-mysql-5.3.3-27.el6_5.1.i686.rpm\nphp-mysql-5.3.3-27.el6_5.1.i686.rpm\nphp-odbc-5.3.3-27.el6_5.1.i686.rpm\nphp-odbc-5.3.3-27.el6_5.1.i686.rpm\nphp-pdo-5.3.3-27.el6_5.1.i686.rpm\nphp-pgsql-5.3.3-27.el6_5.1.i686.rpm\nphp-soap-5.3.3-27.el6_5.1.i686.rpm\nphp-xml-5.3.3-27.el6_5.1.i686.rpm\nphp-xml-5.3.3-27.el6_5.1.i686.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.i686.rpm\n\nppc64:\nphp-5.3.3-27.el6_5.1.ppc64.rpm\nphp-cli-5.3.3-27.el6_5.1.ppc64.rpm\nphp-common-5.3.3-27.el6_5.1.ppc64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.ppc64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.ppc64.rpm\nphp-gd-5.3.3-27.el6_5.1.ppc64.rpm\nphp-gd-5.3.3-27.el6_5.1.ppc64.rpm\nphp-ldap-5.3.3-27.el6_5.1.ppc64.rpm\nphp-mysql-5.3.3-27.el6_5.1.ppc64.rpm\nphp-mysql-5.3.3-27.el6_5.1.ppc64.rpm\nphp-odbc-5.3.3-27.el6_5.1.ppc64.rpm\nphp-odbc-5.3.3-27.el6_5.1.ppc64.rpm\nphp-pdo-5.3.3-27.el6_5.1.ppc64.rpm\nphp-pgsql-5.3.3-27.el6_5.1.ppc64.rpm\nphp-soap-5.3.3-27.el6_5.1.ppc64.rpm\nphp-xml-5.3.3-27.el6_5.1.ppc64.rpm\nphp-xml-5.3.3-27.el6_5.1.ppc64.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.ppc64.rpm\n\ns390x:\nphp-5.3.3-27.el6_5.1.s390x.rpm\nphp-cli-5.3.3-27.el6_5.1.s390x.rpm\nphp-common-5.3.3-27.el6_5.1.s390x.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.s390x.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.s390x.rpm\nphp-gd-5.3.3-27.el6_5.1.s390x.rpm\nphp-gd-5.3.3-27.el6_5.1.s390x.rpm\nphp-ldap-5.3.3-27.el6_5.1.s390x.rpm\nphp-mysql-5.3.3-27.el6_5.1.s390x.rpm\nphp-mysql-5.3.3-27.el6_5.1.s390x.rpm\nphp-odbc-5.3.3-27.el6_5.1.s390x.rpm\nphp-odbc-5.3.3-27.el6_5.1.s390x.rpm\nphp-pdo-5.3.3-27.el6_5.1.s390x.rpm\nphp-pgsql-5.3.3-27.el6_5.1.s390x.rpm\nphp-soap-5.3.3-27.el6_5.1.s390x.rpm\nphp-xml-5.3.3-27.el6_5.1.s390x.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.s390x.rpm\n\nx86_64:\nphp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-cli-5.3.3-27.el6_5.1.x86_64.rpm\nphp-common-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-gd-5.3.3-27.el6_5.1.x86_64.rpm\nphp-gd-5.3.3-27.el6_5.1.x86_64.rpm\nphp-ldap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mysql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mysql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-odbc-5.3.3-27.el6_5.1.x86_64.rpm\nphp-odbc-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pdo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pgsql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-soap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xml-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xml-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nphp-5.3.3-27.el6_5.1.src.rpm\n\ni386:\nphp-bcmath-5.3.3-27.el6_5.1.i686.rpm\nphp-dba-5.3.3-27.el6_5.1.i686.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.i686.rpm\nphp-devel-5.3.3-27.el6_5.1.i686.rpm\nphp-embedded-5.3.3-27.el6_5.1.i686.rpm\nphp-enchant-5.3.3-27.el6_5.1.i686.rpm\nphp-fpm-5.3.3-27.el6_5.1.i686.rpm\nphp-imap-5.3.3-27.el6_5.1.i686.rpm\nphp-intl-5.3.3-27.el6_5.1.i686.rpm\nphp-mbstring-5.3.3-27.el6_5.1.i686.rpm\nphp-process-5.3.3-27.el6_5.1.i686.rpm\nphp-pspell-5.3.3-27.el6_5.1.i686.rpm\nphp-recode-5.3.3-27.el6_5.1.i686.rpm\nphp-snmp-5.3.3-27.el6_5.1.i686.rpm\nphp-tidy-5.3.3-27.el6_5.1.i686.rpm\nphp-zts-5.3.3-27.el6_5.1.i686.rpm\n\nppc64:\nphp-bcmath-5.3.3-27.el6_5.1.ppc64.rpm\nphp-dba-5.3.3-27.el6_5.1.ppc64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.ppc64.rpm\nphp-devel-5.3.3-27.el6_5.1.ppc64.rpm\nphp-embedded-5.3.3-27.el6_5.1.ppc64.rpm\nphp-enchant-5.3.3-27.el6_5.1.ppc64.rpm\nphp-fpm-5.3.3-27.el6_5.1.ppc64.rpm\nphp-imap-5.3.3-27.el6_5.1.ppc64.rpm\nphp-intl-5.3.3-27.el6_5.1.ppc64.rpm\nphp-mbstring-5.3.3-27.el6_5.1.ppc64.rpm\nphp-process-5.3.3-27.el6_5.1.ppc64.rpm\nphp-pspell-5.3.3-27.el6_5.1.ppc64.rpm\nphp-recode-5.3.3-27.el6_5.1.ppc64.rpm\nphp-snmp-5.3.3-27.el6_5.1.ppc64.rpm\nphp-tidy-5.3.3-27.el6_5.1.ppc64.rpm\nphp-zts-5.3.3-27.el6_5.1.ppc64.rpm\n\ns390x:\nphp-bcmath-5.3.3-27.el6_5.1.s390x.rpm\nphp-dba-5.3.3-27.el6_5.1.s390x.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.s390x.rpm\nphp-devel-5.3.3-27.el6_5.1.s390x.rpm\nphp-embedded-5.3.3-27.el6_5.1.s390x.rpm\nphp-enchant-5.3.3-27.el6_5.1.s390x.rpm\nphp-fpm-5.3.3-27.el6_5.1.s390x.rpm\nphp-imap-5.3.3-27.el6_5.1.s390x.rpm\nphp-intl-5.3.3-27.el6_5.1.s390x.rpm\nphp-mbstring-5.3.3-27.el6_5.1.s390x.rpm\nphp-process-5.3.3-27.el6_5.1.s390x.rpm\nphp-pspell-5.3.3-27.el6_5.1.s390x.rpm\nphp-recode-5.3.3-27.el6_5.1.s390x.rpm\nphp-snmp-5.3.3-27.el6_5.1.s390x.rpm\nphp-tidy-5.3.3-27.el6_5.1.s390x.rpm\nphp-zts-5.3.3-27.el6_5.1.s390x.rpm\n\nx86_64:\nphp-bcmath-5.3.3-27.el6_5.1.x86_64.rpm\nphp-dba-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-devel-5.3.3-27.el6_5.1.x86_64.rpm\nphp-embedded-5.3.3-27.el6_5.1.x86_64.rpm\nphp-enchant-5.3.3-27.el6_5.1.x86_64.rpm\nphp-fpm-5.3.3-27.el6_5.1.x86_64.rpm\nphp-imap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-intl-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mbstring-5.3.3-27.el6_5.1.x86_64.rpm\nphp-process-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pspell-5.3.3-27.el6_5.1.x86_64.rpm\nphp-recode-5.3.3-27.el6_5.1.x86_64.rpm\nphp-snmp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-tidy-5.3.3-27.el6_5.1.x86_64.rpm\nphp-zts-5.3.3-27.el6_5.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nphp-5.3.3-27.el6_5.1.src.rpm\n\ni386:\nphp-5.3.3-27.el6_5.1.i686.rpm\nphp-cli-5.3.3-27.el6_5.1.i686.rpm\nphp-common-5.3.3-27.el6_5.1.i686.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.i686.rpm\nphp-gd-5.3.3-27.el6_5.1.i686.rpm\nphp-ldap-5.3.3-27.el6_5.1.i686.rpm\nphp-mysql-5.3.3-27.el6_5.1.i686.rpm\nphp-odbc-5.3.3-27.el6_5.1.i686.rpm\nphp-pdo-5.3.3-27.el6_5.1.i686.rpm\nphp-pgsql-5.3.3-27.el6_5.1.i686.rpm\nphp-soap-5.3.3-27.el6_5.1.i686.rpm\nphp-xml-5.3.3-27.el6_5.1.i686.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.i686.rpm\n\nx86_64:\nphp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-cli-5.3.3-27.el6_5.1.x86_64.rpm\nphp-common-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-gd-5.3.3-27.el6_5.1.x86_64.rpm\nphp-ldap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mysql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-odbc-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pdo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pgsql-5.3.3-27.el6_5.1.x86_64.rpm\nphp-soap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xml-5.3.3-27.el6_5.1.x86_64.rpm\nphp-xmlrpc-5.3.3-27.el6_5.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nphp-5.3.3-27.el6_5.1.src.rpm\n\ni386:\nphp-bcmath-5.3.3-27.el6_5.1.i686.rpm\nphp-dba-5.3.3-27.el6_5.1.i686.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.i686.rpm\nphp-devel-5.3.3-27.el6_5.1.i686.rpm\nphp-embedded-5.3.3-27.el6_5.1.i686.rpm\nphp-enchant-5.3.3-27.el6_5.1.i686.rpm\nphp-fpm-5.3.3-27.el6_5.1.i686.rpm\nphp-imap-5.3.3-27.el6_5.1.i686.rpm\nphp-intl-5.3.3-27.el6_5.1.i686.rpm\nphp-mbstring-5.3.3-27.el6_5.1.i686.rpm\nphp-process-5.3.3-27.el6_5.1.i686.rpm\nphp-pspell-5.3.3-27.el6_5.1.i686.rpm\nphp-recode-5.3.3-27.el6_5.1.i686.rpm\nphp-snmp-5.3.3-27.el6_5.1.i686.rpm\nphp-tidy-5.3.3-27.el6_5.1.i686.rpm\nphp-zts-5.3.3-27.el6_5.1.i686.rpm\n\nx86_64:\nphp-bcmath-5.3.3-27.el6_5.1.x86_64.rpm\nphp-dba-5.3.3-27.el6_5.1.x86_64.rpm\nphp-debuginfo-5.3.3-27.el6_5.1.x86_64.rpm\nphp-devel-5.3.3-27.el6_5.1.x86_64.rpm\nphp-embedded-5.3.3-27.el6_5.1.x86_64.rpm\nphp-enchant-5.3.3-27.el6_5.1.x86_64.rpm\nphp-fpm-5.3.3-27.el6_5.1.x86_64.rpm\nphp-imap-5.3.3-27.el6_5.1.x86_64.rpm\nphp-intl-5.3.3-27.el6_5.1.x86_64.rpm\nphp-mbstring-5.3.3-27.el6_5.1.x86_64.rpm\nphp-process-5.3.3-27.el6_5.1.x86_64.rpm\nphp-pspell-5.3.3-27.el6_5.1.x86_64.rpm\nphp-recode-5.3.3-27.el6_5.1.x86_64.rpm\nphp-snmp-5.3.3-27.el6_5.1.x86_64.rpm\nphp-tidy-5.3.3-27.el6_5.1.x86_64.rpm\nphp-zts-5.3.3-27.el6_5.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2012-1571.html\nhttps://www.redhat.com/security/data/cve/CVE-2013-6712.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0237.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0238.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-1943.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2270.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3479.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3480.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3515.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-4049.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-4721.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFT4bujXlSAg2UNWIIRAjupAJ48N95gPfI5/pzaIYdf4przuZNdmwCgjE/L\nx544JALirz19qNQAHQ4sjzQ=\n=t3Ft\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. The Common\nVulnerabilities and Exposures project identifies the following issues:\n\nCVE-2013-6420\n\n Stefan Esser reported possible memory corruption in\n openssl_x509_parse(). \n\nIn addition, the update for Debian 7 \"Wheezy\" contains several bugfixes\noriginally targeted for the upcoming Wheezy point release. \n\nFor the oldstable distribution (squeeze), these problems have been fixed in\nversion 5.3.3-7+squeeze18. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 5.4.4-14+deb7u7. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 5.5.6+dfsg-2. \n\nWe recommend that you upgrade your php5 packages",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-6712"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
},
{
"db": "BID",
"id": "64018"
},
{
"db": "VULHUB",
"id": "VHN-66714"
},
{
"db": "PACKETSTORM",
"id": "128049"
},
{
"db": "PACKETSTORM",
"id": "124882"
},
{
"db": "PACKETSTORM",
"id": "124407"
},
{
"db": "PACKETSTORM",
"id": "128505"
},
{
"db": "PACKETSTORM",
"id": "127757"
},
{
"db": "PACKETSTORM",
"id": "124406"
}
],
"trust": 2.52
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2013-6712",
"trust": 3.4
},
{
"db": "JVN",
"id": "JVNVU91828320",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201311-464",
"trust": 0.7
},
{
"db": "BID",
"id": "64018",
"trust": 0.4
},
{
"db": "PACKETSTORM",
"id": "128900",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-66714",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "128049",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "124882",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "124407",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "128505",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "127757",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "124406",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-66714"
},
{
"db": "BID",
"id": "64018"
},
{
"db": "PACKETSTORM",
"id": "128049"
},
{
"db": "PACKETSTORM",
"id": "124882"
},
{
"db": "PACKETSTORM",
"id": "124407"
},
{
"db": "PACKETSTORM",
"id": "128505"
},
{
"db": "PACKETSTORM",
"id": "127757"
},
{
"db": "PACKETSTORM",
"id": "124406"
},
{
"db": "CNNVD",
"id": "CNNVD-201311-464"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
},
{
"db": "NVD",
"id": "CVE-2013-6712"
}
]
},
"id": "VAR-201311-0379",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-66714"
}
],
"trust": 0.01
},
"last_update_date": "2026-03-09T20:03:10.246000Z",
"patch": {
"_id": null,
"data": [
{
"title": "APPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
},
{
"title": "HT204659",
"trust": 0.8,
"url": "http://support.apple.com/en-us/HT204659"
},
{
"title": "HT204659",
"trust": 0.8,
"url": "http://support.apple.com/ja-jp/HT204659"
},
{
"title": "Fixed bug #66060 (Heap buffer over-read in DateInterval)",
"trust": 0.8,
"url": "http://git.php.net/?p=php-src.git;a=commit;h=12fe4e90be7bfa2a763197079f68f5568a14e071"
},
{
"title": "Bug #66060",
"trust": 0.8,
"url": "https://bugs.php.net/bug.php?id=66060"
},
{
"title": "RHSA-2014:1765",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2014-1765.html"
},
{
"title": "Multiple Buffer Errors vulnerabilities in PHP",
"trust": 0.8,
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_buffer_errors_vulnerabilities_in1"
},
{
"title": "ext/date/lib/parse_iso_intervals",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=46850"
},
{
"title": "ext/date/lib/parse_iso_intervals",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=46849"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201311-464"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-66714"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
},
{
"db": "NVD",
"id": "CVE-2013-6712"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.0,
"url": "https://bugs.php.net/bug.php?id=66060"
},
{
"trust": 1.8,
"url": "http://www.ubuntu.com/usn/usn-2055-1"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2015/apr/msg00001.html"
},
{
"trust": 1.7,
"url": "https://support.apple.com/ht204659"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2013/dsa-2816"
},
{
"trust": 1.7,
"url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04463322"
},
{
"trust": 1.7,
"url": "http://rhn.redhat.com/errata/rhsa-2014-1765.html"
},
{
"trust": 1.7,
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html"
},
{
"trust": 1.7,
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html"
},
{
"trust": 1.0,
"url": "http://git.php.net/?p=php-src.git;a=commit;h=12fe4e90be7bfa2a763197079f68f5568a14e071"
},
{
"trust": 1.0,
"url": "http://git.php.net/?p=php-src.git%3ba=commit%3bh=12fe4e90be7bfa2a763197079f68f5568a14e071"
},
{
"trust": 0.9,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6712"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu91828320/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6712"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-6712"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-6420"
},
{
"trust": 0.4,
"url": "https://rhn.redhat.com/errata/rhsa-2014-1012.html"
},
{
"trust": 0.3,
"url": "http://www.php.net/"
},
{
"trust": 0.3,
"url": "http://www.ubuntu.com/usn/usn-2055-1/"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-0238"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-1943"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-0237"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-2270"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4049"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-4248"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4670"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-4635"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3597"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4636"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1635"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1943"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2110"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2497"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-0185"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4113"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1635"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-7345"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-5120"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-3735"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1643"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-2497"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-201408-11.xml"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4718"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1824"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-7327"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2270"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7327"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3981"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1824"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0185"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6420"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0237"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3597"
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-4636"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-7226"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4670"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1643"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6712"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7226"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4718"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0238"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-4049"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7345"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-5120"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3735"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-2110"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4248"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3981"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-4113"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4635"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4248"
},
{
"trust": 0.1,
"url": "http://www.php.net/changelog-5.php#5.5.8"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/en/support/security/"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/en/support/security/advisories/"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6420"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/php5/5.4.9-4ubuntu2.4"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.22"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.9"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/php5/5.5.3+dfsg-1ubuntu2.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/php5/5.4.6-1ubuntu1.5"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
},
{
"trust": 0.1,
"url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-2640"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-6422"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-4545"
},
{
"trust": 0.1,
"url": "http://h18013.www1.hp.com/products/servers/management/agents/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-2641"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-2642"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2013-6712.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-3480.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-2270.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-4049.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-4721.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-0238.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2012-1571.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-1943.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-3479.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3480"
},
{
"trust": 0.1,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4721"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3515"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-3515.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3479"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2014-0237.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/key/#package"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-1571"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-66714"
},
{
"db": "BID",
"id": "64018"
},
{
"db": "PACKETSTORM",
"id": "128049"
},
{
"db": "PACKETSTORM",
"id": "124882"
},
{
"db": "PACKETSTORM",
"id": "124407"
},
{
"db": "PACKETSTORM",
"id": "128505"
},
{
"db": "PACKETSTORM",
"id": "127757"
},
{
"db": "PACKETSTORM",
"id": "124406"
},
{
"db": "CNNVD",
"id": "CNNVD-201311-464"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
},
{
"db": "NVD",
"id": "CVE-2013-6712"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "VULHUB",
"id": "VHN-66714",
"ident": null
},
{
"db": "BID",
"id": "64018",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "128049",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "124882",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "124407",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "128505",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "127757",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "124406",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201311-464",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2013-005322",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2013-6712",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2013-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-66714",
"ident": null
},
{
"date": "2013-11-27T00:00:00",
"db": "BID",
"id": "64018",
"ident": null
},
{
"date": "2014-08-29T22:24:02",
"db": "PACKETSTORM",
"id": "128049",
"ident": null
},
{
"date": "2014-01-22T01:55:34",
"db": "PACKETSTORM",
"id": "124882",
"ident": null
},
{
"date": "2013-12-14T00:04:46",
"db": "PACKETSTORM",
"id": "124407",
"ident": null
},
{
"date": "2014-10-01T19:15:04",
"db": "PACKETSTORM",
"id": "128505",
"ident": null
},
{
"date": "2014-08-07T06:20:07",
"db": "PACKETSTORM",
"id": "127757",
"ident": null
},
{
"date": "2013-12-14T00:04:19",
"db": "PACKETSTORM",
"id": "124406",
"ident": null
},
{
"date": "2013-11-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201311-464",
"ident": null
},
{
"date": "2013-12-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-005322",
"ident": null
},
{
"date": "2013-11-28T04:37:39.840000",
"db": "NVD",
"id": "CVE-2013-6712",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-66714",
"ident": null
},
{
"date": "2015-04-16T18:05:00",
"db": "BID",
"id": "64018",
"ident": null
},
{
"date": "2022-11-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201311-464",
"ident": null
},
{
"date": "2015-08-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-005322",
"ident": null
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2013-6712",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "128049"
},
{
"db": "PACKETSTORM",
"id": "124882"
},
{
"db": "PACKETSTORM",
"id": "127757"
},
{
"db": "CNNVD",
"id": "CNNVD-201311-464"
}
],
"trust": 0.9
},
"title": {
"_id": null,
"data": "PHP of ext/date/lib/parse_iso_intervals.c of scan Service disruption in functions (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-005322"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201311-464"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.