Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
patchinfo.4022
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4022
<patchinfo incident="4022"> <issue id="1019550" tracker="bnc">VUL-1: CVE-2016-7478: php: Unserialize Exception object can lead to infinite loop</issue> <issue id="1022219" tracker="bnc">VUL-1: CVE-2016-10158: php: ext/exif/exif.c :: exif_convert_any_to_int DoS via crafted EXIF data</issue> <issue id="1022255" tracker="bnc">VUL-0: CVE-2016-10159: php: ext/phar/phar.c :: phar_parse_pharfile integer overflow DoS</issue> <issue id="1022257" tracker="bnc">VUL-0: CVE-2016-10160: php: ext/phar/phar.c :: phar_parse_pharfile off-by-one error via crafted PHAR archives with an alias mismatch</issue> <issue id="1022260" tracker="bnc">VUL-1: CVE-2016-10161: php: ext/standard/var_unserializer.c :: object_common1 DoS via crafted serialized data</issue> <issue id="1022263" tracker="bnc">VUL-1: CVE-2016-10166: gd,php5,php53,php7: potential unsigned underflow</issue> <issue id="1022264" tracker="bnc">VUL-1: CVE-2016-10167: gd,php5,php53,php7: DOS vulnerability in gdImageCreateFromGd2Ctx()</issue> <issue id="1022265" tracker="bnc">VUL-0: CVE-2016-10168: gd,php5,php53,php7: Signed Integer Overflow gd_io.c</issue> <issue id="2016-10158" tracker="cve" /> <issue id="2016-10159" tracker="cve" /> <issue id="2016-10160" tracker="cve" /> <issue id="2016-10161" tracker="cve" /> <issue id="2016-10166" tracker="cve" /> <issue id="2016-10167" tracker="cve" /> <issue id="2016-10168" tracker="cve" /> <issue id="2016-7478" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>pgajdos</packager> <description> This update for php5 fixes the following issues: - CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite loop, causing denial of service (bsc#1019550) - CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c in PHP allowed remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1. (bsc#1022219) - CVE-2016-10159: Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive. (bsc#1022255) - CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch. (bsc#1022257) - CVE-2016-10161: The object_common1 function in ext/standard/var_unserializer.c in PHP allowed remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call. (bsc#1022260) - CVE-2016-10166: A potential unsigned underflow in gd interpolation functions could lead to memory corruption in the PHP gd module (bsc#1022263) - CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx() could lead to php out of memory even on small files. (bsc#1022264) - CVE-2016-10168: A signed integer overflow in the gd module could lead to memory corruption (bsc#1022265) </description> <summary>Security update for php5</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor