Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:GA
patchinfo.4503
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4503
<patchinfo incident="4503"> <issue id="1040883" tracker="bnc">VUL-0: CVE-2017-9227: php5,php7,ruby,php53: stack out-of-bounds read in mbc_enc_len() during regular expression searching</issue> <issue id="1040889" tracker="bnc">VUL-0: CVE-2017-9226: php5,php7,ruby,php53: heap out-of-bounds write orread occurs in next_state_val() during regular expression compilation</issue> <issue id="1040891" tracker="bnc">VUL-0: CVE-2017-9224: php5,php7,ruby,php53: stack out-of-bounds read occurs in match_at() during regular expression searching</issue> <issue id="1035111" tracker="bnc">VUL-1: CVE-2016-6294: php5,php53,php7: workaround for icu: locale_accept_from_http out-of-bounds access</issue> <issue id="2017-9224" tracker="cve" /> <issue id="2017-9227" tracker="cve" /> <issue id="2016-6294" tracker="cve" /> <issue id="2017-9226" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pgajdos</packager> <description>This update for php5 fixes the following security issues: - CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111). - CVE-2017-9227: A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. (bsc#1040883) - CVE-2017-9226: A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. (bsc#1040889) - CVE-2017-9224: A stack out-of-bounds read occurs in match_at() during regular expression searching. (bsc#1040891) </description> <summary>Security update for php5</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor