CloudLinux - CloudLinux Blog - HardenedPHP updated
Blog

By accepting you will be accessing a service provided by a third-party external to https://www.cloudlinux.com/

HardenedPHP updated

HardenedPHP updated

The new updated HardenedPHP packages are available for download from our production repository.

alt-php55-5.5.38-9

  • bug 73764: Crash while loading hostile phar archive (CVE-2016-10159);
  • bug 73768: Memory corruption when loading hostile phar (CVE-2016-10160);
  • bug 73825: Heap out of bounds read on unserialize in finish_nested_data() (CVE-2016-10161);
  • bug 68447: grapheme_extract take an extra trailing character;
  • bug 70213: Unserialize context shared on double class lookup;
  • bug 73549: Use after free when stream is passed to imagepng;
  • bug 73737: FPE when parsing a tag format (CVE-2016-10158);
  • bug 73773: Seg fault when loading hostile phar;
  • bug 73868: Fix DOS vulnerability in gdImageCreateFromGd2Ctx();
  • bug 73869: Signed Integer Overflow gd_io.c.

alt-php54-5.4.45-27

  • bug 73764: Crash while loading hostile phar archive (CVE-2016-10159);
  • bug 73768: Memory corruption when loading hostile phar (CVE-2016-10160);
  • bug 73825: Heap out of bounds read on unserialize in finish_nested_data() (CVE-2016-10161);
  • bug 68447: grapheme_extract take an extra trailing character;
  • bug 70213: Unserialize context shared on double class lookup;
  • bug 73549: Use after free when stream is passed to imagepng;
  • bug 73737: FPE when parsing a tag format (CVE-2016-10158);
  • bug 73773: Seg fault when loading hostile phar;
  • bug 73868: Fix DOS vulnerability in gdImageCreateFromGd2Ctx();
  • bug 73869: Signed Integer Overflow gd_io.c.

alt-php53-5.3.29-43

  • bug 73764: Crash while loading hostile phar archive (CVE-2016-10159);
  • bug 73768: Memory corruption when loading hostile phar (CVE-2016-10160);
  • bug 73825: Heap out of bounds read on unserialize in finish_nested_data() (CVE-2016-10161);
  • bug 68447: grapheme_extract take an extra trailing character;
  • bug 73737: FPE when parsing a tag format (CVE-2016-10158);
  • bug 73773: Seg fault when loading hostile phar;
  • bug 73868: Fix DOS vulnerability in gdImageCreateFromGd2Ctx();
  • bug 73869: Signed Integer Overflow gd_io.c.

alt-php52-5.2.17-94

  • bug 73764: Crash while loading hostile phar archive (CVE-2016-10159);
  • bug 73768: Memory corruption when loading hostile phar (CVE-2016-10160);
  • bug 73825: Heap out of bounds read on unserialize in finish_nested_data() (CVE-2016-10161);
  • bug 68447: grapheme_extract take an extra trailing character;
  • bug 73737: FPE when parsing a tag format (CVE-2016-10158);
  • bug 73773: Seg fault when loading hostile phar;
  • bug 73868: Fix DOS vulnerability in gdImageCreateFromGd2Ctx();
  • bug 73869: Signed Integer Overflow gd_io.c.

alt-php51-5.1.6-67

  • bug 73825: Heap out of bounds read on unserialize in finish_nested_data() (CVE-2016-10161);
  • bug 73737: FPE when parsing a tag format (CVE-2016-10158);
  • bug 73868: Fix DOS vulnerability in gdImageCreateFromGd2Ctx();
  • bug 73869: Signed Integer Overflow gd_io.c.

alt-php44-4.4.9-58

  • bug 73825: Heap out of bounds read on unserialize in finish_nested_data() (CVE-2016-10161);
  • bug 73737: FPE when parsing a tag format (CVE-2016-10158);
  • bug 73868: Fix DOS vulnerability in gdImageCreateFromGd2Ctx();
  • bug 73869: Signed Integer Overflow gd_io.c.

To install run the command:

yum groupinstall alt-php
Security warning: major vulnerability found in Lin...
LVE Manager’s new UI is now in beta!
 

Комментарии

Нет созданных комментариев. Будь первым кто оставит комментарий.
Уже зарегистрированны? Войти на сайт
Guest
08.08.2020

Изображение капчи