SUSE Security Update: Security update for php53
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:1638-1
Rating: important
References: #884986 #884987 #884989 #884990 #884991 #884992
#885961 #886059 #886060 #893849 #893853 #902357
#902360 #902368 #910659 #914690 #917150 #918768
#919080 #921950 #922451 #922452 #923945 #924972
#925109 #928506 #928511 #931421 #931769 #931772
#931776 #933227 #935074 #935224 #935226 #935227
#935229 #935232 #935234 #935274 #935275 #938719
#938721 #942291 #942296 #945412 #945428 #949961
#968284 #969821 #971611 #971612 #971912 #973351
#973792 #976996 #976997 #977003 #977005 #977991
#977994 #978827 #978828 #978829 #978830 #980366
#980373 #980375 #981050 #982010 #982011 #982012
#982013 #982162
Cross-References: CVE-2004-1019 CVE-2006-7243 CVE-2014-0207
CVE-2014-3478 CVE-2014-3479 CVE-2014-3480
CVE-2014-3487 CVE-2014-3515 CVE-2014-3597
CVE-2014-3668 CVE-2014-3669 CVE-2014-3670
CVE-2014-4049 CVE-2014-4670 CVE-2014-4698
CVE-2014-4721 CVE-2014-5459 CVE-2014-8142
CVE-2014-9652 CVE-2014-9705 CVE-2014-9709
CVE-2014-9767 CVE-2015-0231 CVE-2015-0232
CVE-2015-0273 CVE-2015-1352 CVE-2015-2301
CVE-2015-2305 CVE-2015-2783 CVE-2015-2787
CVE-2015-3152 CVE-2015-3329 CVE-2015-3411
CVE-2015-3412 CVE-2015-4021 CVE-2015-4022
CVE-2015-4024 CVE-2015-4026 CVE-2015-4116
CVE-2015-4148 CVE-2015-4598 CVE-2015-4599
CVE-2015-4600 CVE-2015-4601 CVE-2015-4602
CVE-2015-4603 CVE-2015-4643 CVE-2015-4644
CVE-2015-5161 CVE-2015-5589 CVE-2015-5590
CVE-2015-6831 CVE-2015-6833 CVE-2015-6836
CVE-2015-6837 CVE-2015-6838 CVE-2015-7803
CVE-2015-8835 CVE-2015-8838 CVE-2015-8866
CVE-2015-8867 CVE-2015-8873 CVE-2015-8874
CVE-2015-8879 CVE-2016-2554 CVE-2016-3141
CVE-2016-3142 CVE-2016-3185 CVE-2016-4070
CVE-2016-4073 CVE-2016-4342 CVE-2016-4346
CVE-2016-4537 CVE-2016-4538 CVE-2016-4539
CVE-2016-4540 CVE-2016-4541 CVE-2016-4542
CVE-2016-4543 CVE-2016-4544 CVE-2016-5093
CVE-2016-5094 CVE-2016-5095 CVE-2016-5096
CVE-2016-5114
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
______________________________________________________________________________
An update that fixes 85 vulnerabilities is now available.
Description:
This update for php53 to version 5.3.17 fixes the following issues:
These security issues were fixed:
– CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010).
– CVE-2016-5094: Don’t create strings with lengths outside int range
(bnc#982011).
– CVE-2016-5095: Don’t create strings with lengths outside int range
(bnc#982012).
– CVE-2016-5096: int/size_t confusion in fread (bsc#982013).
– CVE-2016-5114: fpm_log.c memory leak and buffer overflow (bnc#982162).
– CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP
mishandles driver behavior for SQL_WVARCHAR columns, which allowed
remote attackers to cause a denial of service (application crash) in
opportunistic circumstances by leveraging use of the odbc_fetch_array
function to access a certain type of Microsoft SQL Server table
(bsc#981050).
– CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert
function in ext/spl/spl_heap.c in PHP allowed remote attackers to
execute arbitrary code by triggering a failed SplMinHeap::compare
operation (bsc#980366).
– CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed
remote attackers to cause a denial of service via a crafted
imagefilltoborder call (bsc#980375).
– CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c
in PHP allowed remote attackers to cause a denial of service
(segmentation fault) via recursive method calls (bsc#980373).
– CVE-2016-4540: The grapheme_stripos function in
ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to
cause a denial of service (out-of-bounds read) or possibly have
unspecified other impact via a negative offset (bsc#978829).
– CVE-2016-4541: The grapheme_strpos function in
ext/intl/grapheme/grapheme_string.c in PHP allowed remote attackers to
cause a denial of service (out-of-bounds read) or possibly have
unspecified other impact via a negative offset (bsc#978829.
– CVE-2016-4542: The exif_process_IFD_TAG function in ext/exif/exif.c in
PHP did not properly construct spprintf arguments, which allowed remote
attackers to cause a denial of service (out-of-bounds read) or possibly
have unspecified other impact via crafted header data (bsc#978830).
– CVE-2016-4543: The exif_process_IFD_in_JPEG function in ext/exif/exif.c
in PHP did not validate IFD sizes, which allowed remote attackers to
cause a denial of service (out-of-bounds read) or possibly have
unspecified other impact via crafted header data (bsc#978830.
– CVE-2016-4544: The exif_process_TIFF_in_JPEG function in ext/exif/exif.c
in PHP did not validate TIFF start data, which allowed remote attackers
to cause a denial of service (out-of-bounds read) or possibly have
unspecified other impact via crafted header data (bsc#978830.
– CVE-2016-4537: The bcpowmod function in ext/bcmath/bcmath.c in PHP
accepted a negative integer for the scale argument, which allowed remote
attackers to cause a denial of service or possibly have unspecified
other impact via a crafted call (bsc#978827).
– CVE-2016-4538: The bcpowmod function in ext/bcmath/bcmath.c in PHP
modified certain data structures without considering whether they are
copies of the _zero_, _one_, or _two_ global variable, which allowed
remote attackers to cause a denial of service or possibly have
unspecified other impact via a crafted call (bsc#978827).
– CVE-2016-4539: The xml_parse_into_struct function in ext/xml/xml.c in
PHP allowed remote attackers to cause a denial of service (buffer
under-read and segmentation fault) or possibly have unspecified other
impact via crafted XML data in the second argument, leading to a parser
level of zero (bsc#978828).
– CVE-2016-4342: ext/phar/phar_object.c in PHP mishandles zero-length
uncompressed data, which allowed remote attackers to cause a denial of
service (heap memory corruption) or possibly have unspecified other
impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive (bsc#977991).
– CVE-2016-4346: Integer overflow in the str_pad function in
ext/standard/string.c in PHP allowed remote attackers to cause a denial
of service or possibly have unspecified other impact via a long string,
leading to a heap-based buffer overflow (bsc#977994).
– CVE-2016-4073: Multiple integer overflows in the mbfl_strcut function in
ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP allowed remote attackers to
cause a denial of service (application crash) or possibly execute
arbitrary code via a crafted mb_strcut call (bsc#977003).
– CVE-2015-8867: The openssl_random_pseudo_bytes function in
ext/openssl/openssl.c in PHP incorrectly relied on the deprecated
RAND_pseudo_bytes function, which made it easier for remote attackers to
defeat cryptographic protection mechanisms via unspecified vectors
(bsc#977005).
– CVE-2016-4070: Integer overflow in the php_raw_url_encode function in
ext/standard/url.c in PHP allowed remote attackers to cause a denial of
service (application crash) via a long string to the rawurlencode
function (bsc#976997).
– CVE-2015-8866: ext/libxml/libxml.c in PHP when PHP-FPM is used, did not
isolate each thread from libxml_disable_entity_loader changes in other
threads, which allowed remote attackers to conduct XML External Entity
(XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document,
a related issue to CVE-2015-5161 (bsc#976996).
– CVE-2015-8838: ext/mysqlnd/mysqlnd.c in PHP used a client SSL option to
mean that SSL is optional, which allowed man-in-the-middle attackers to
spoof servers via a cleartext-downgrade attack, a related issue to
CVE-2015-3152 (bsc#973792).
– CVE-2015-8835: The make_http_soap_request function in
ext/soap/php_http.c in PHP did not properly retrieve keys, which allowed
remote attackers to cause a denial of service (NULL pointer dereference,
type confusion, and application crash) or possibly execute arbitrary
code via crafted serialized data representing a numerically indexed
_cookies array, related to the SoapClient::__call method in
ext/soap/soap.c (bsc#973351).
– CVE-2016-3141: Use-after-free vulnerability in wddx.c in the WDDX
extension in PHP allowed remote attackers to cause a denial of service
(memory corruption and application crash) or possibly have unspecified
other impact by triggering a wddx_deserialize call on XML data
containing a crafted var element (bsc#969821).
– CVE-2016-3142: The phar_parse_zipfile function in zip.c in the PHAR
extension in PHP allowed remote attackers to obtain sensitive
information from process memory or cause a denial of service
(out-of-bounds read and application crash) by placing a PK\x05\x06
signature at an invalid location (bsc#971912).
– CVE-2014-9767: Directory traversal vulnerability in the
ZipArchive::extractTo function in ext/zip/php_zip.c in PHP
ext/zip/ext_zip.cpp in HHVM allowed remote attackers to create arbitrary
empty directories via a crafted ZIP archive (bsc#971612).
– CVE-2016-3185: The make_http_soap_request function in
ext/soap/php_http.c in PHP allowed remote attackers to obtain sensitive
information from process memory or cause a denial of service (type
confusion and application crash) via crafted serialized _cookies data,
related to the SoapClient::__call method in ext/soap/soap.c (bsc#971611).
– CVE-2016-2554: Stack-based buffer overflow in ext/phar/tar.c in PHP
allowed remote attackers to cause a denial of service (application
crash) or possibly have unspecified other impact via a crafted TAR
archive (bsc#968284).
– CVE-2015-7803: The phar_get_entry_data function in ext/phar/util.c in
PHP allowed remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a .phar file with a crafted TAR
archive entry in which the Link indicator references a file that did not
exist (bsc#949961).
– CVE-2015-6831: Multiple use-after-free vulnerabilities in SPL in PHP
allowed remote attackers to execute arbitrary code via vectors involving
(1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList,
which are mishandled during unserialization (bsc#942291).
– CVE-2015-6833: Directory traversal vulnerability in the PharData class
in PHP allowed remote attackers to write to arbitrary files via a ..
(dot dot) in a ZIP archive entry that is mishandled during an extractTo
call (bsc#942296.
– CVE-2015-6836: The SoapClient __call method in ext/soap/soap.c in PHP
did not properly manage headers, which allowed remote attackers to
execute arbitrary code via crafted serialized data that triggers a “type
confusion” in the serialize_function_call function (bsc#945428).
– CVE-2015-6837: The xsl_ext_function_php function in
ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider
the possibility of a NULL valuePop return value proceeding with a free
operation during initial error checking, which allowed remote attackers
to cause a denial of service (NULL pointer dereference and application
crash) via a crafted XML document, a different vulnerability than
CVE-2015-6838 (bsc#945412).
– CVE-2015-6838: The xsl_ext_function_php function in
ext/xsl/xsltprocessor.c in PHP when libxml2 is used, did not consider
the possibility of a NULL valuePop return value proceeding with a free
operation after the principal argument loop, which allowed remote
attackers to cause a denial of service (NULL pointer dereference and
application crash) via a crafted XML document, a different vulnerability
than CVE-2015-6837 (bsc#945412).
– CVE-2015-5590: Stack-based buffer overflow in the phar_fix_filepath
function in ext/phar/phar.c in PHP allowed remote attackers to cause a
denial of service or possibly have unspecified other impact via a large
length value, as demonstrated by mishandling of an e-mail attachment by
the imap PHP extension (bsc#938719).
– CVE-2015-5589: The phar_convert_to_other function in
ext/phar/phar_object.c in PHP did not validate a file pointer a close
operation, which allowed remote attackers to cause a denial of service
(segmentation fault) or possibly have unspecified other impact via a
crafted TAR archive that is mishandled in a Phar::convertToData call
(bsc#938721).
– CVE-2015-4602: The __PHP_Incomplete_Class function in
ext/standard/incomplete_class.c in PHP allowed remote attackers to cause
a denial of service (application crash) or possibly execute arbitrary
code via an unexpected data type, related to a “type confusion” issue
(bsc#935224).
– CVE-2015-4599: The SoapFault::__toString method in ext/soap/soap.c in
PHP allowed remote attackers to obtain sensitive information, cause a
denial of service (application crash), or possibly execute arbitrary
code via an unexpected data type, related to a “type confusion” issue
(bsc#935226).
– CVE-2015-4600: The SoapClient implementation in PHP allowed remote
attackers to cause a denial of service (application crash) or possibly
execute arbitrary code via an unexpected data type, related to “type
confusion” issues in the (1) SoapClient::__getLastRequest, (2)
SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders,
(4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies,
and (6) SoapClient::__setCookie methods (bsc#935226).
– CVE-2015-4601: PHP allowed remote attackers to cause a denial of service
(application crash) or possibly execute arbitrary code via an unexpected
data type, related to “type confusion” issues in (1)
ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3)
ext/soap/soap.c, a different issue than CVE-2015-4600 (bsc#935226.
– CVE-2015-4603: The exception::getTraceAsString function in
Zend/zend_exceptions.c in PHP allowed remote attackers to execute
arbitrary code via an unexpected data type, related to a “type
confusion” issue (bsc#935234).
– CVE-2015-4644: The php_pgsql_meta_data function in pgsql.c in the
PostgreSQL (aka pgsql) extension in PHP did not validate token
extraction for table names, which might allowed remote attackers to
cause a denial of service (NULL pointer dereference and application
crash) via a crafted name. NOTE: this vulnerability exists because of an
incomplete fix for CVE-2015-1352 (bsc#935274).
– CVE-2015-4643: Integer overflow in the ftp_genlist function in
ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary
code via a long reply to a LIST command, leading to a heap-based buffer
overflow. NOTE: this vulnerability exists because of an incomplete fix
for CVE-2015-4022 (bsc#935275).
– CVE-2015-3411: PHP did not ensure that pathnames lack %00 sequences,
which might have allowed remote attackers to read or write to arbitrary
files via crafted input to an application that calls (1) a DOMDocument
load method, (2) the xmlwriter_open_uri function, (3) the finfo_file
function, or (4) the hash_hmac_file function, as demonstrated by a
filename\0.xml attack that bypasses an intended configuration in which
client users may read only .xml files (bsc#935227).
– CVE-2015-3412: PHP did not ensure that pathnames lack %00 sequences,
which might have allowed remote attackers to read arbitrary files via
crafted input to an application that calls the
stream_resolve_include_path function in ext/standard/streamsfuncs.c, as
demonstrated by a filename\0.extension attack that bypasses an intended
configuration in which client users may read files with only one
specific extension (bsc#935229).
– CVE-2015-4598: PHP did not ensure that pathnames lack %00 sequences,
which might have allowed remote attackers to read or write to arbitrary
files via crafted input to an application that calls (1) a DOMDocument
save method or (2) the GD imagepsloadfont function, as demonstrated by a
filename\0.html attack that bypasses an intended configuration in which
client users may write to only .html files (bsc#935232).
– CVE-2015-4148: The do_soap_call function in ext/soap/soap.c in PHP did
not verify that the uri property is a string, which allowed remote
attackers to obtain sensitive information by providing crafted
serialized data with an int data type, related to a “type confusion”
issue (bsc#933227).
– CVE-2015-4024: Algorithmic complexity vulnerability in the
multipart_buffer_headers function in main/rfc1867.c in PHP allowed
remote attackers to cause a denial of service (CPU consumption) via
crafted form data that triggers an improper order-of-growth outcome
(bsc#931421).
– CVE-2015-4026: The pcntl_exec implementation in PHP truncates a pathname
upon encountering a \x00 character, which might allowed remote attackers
to bypass intended extension restrictions and execute files with
unexpected names via a crafted first argument. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2006-7243 (bsc#931776).
– CVE-2015-4022: Integer overflow in the ftp_genlist function in
ext/ftp/ftp.c in PHP allowed remote FTP servers to execute arbitrary
code via a long reply to a LIST command, leading to a heap-based buffer
overflow (bsc#931772).
– CVE-2015-4021: The phar_parse_tarfile function in ext/phar/tar.c in PHP
did not verify that the first character of a filename is different from
the \0 character, which allowed remote attackers to cause a denial of
service (integer underflow and memory corruption) via a crafted entry in
a tar archive (bsc#931769).
– CVE-2015-3329: Multiple stack-based buffer overflows in the
phar_set_inode function in phar_internal.h in PHP allowed remote
attackers to execute arbitrary code via a crafted length value in a (1)
tar, (2) phar, or (3) ZIP archive (bsc#928506).
– CVE-2015-2783: ext/phar/phar.c in PHP allowed remote attackers to obtain
sensitive information from process memory or cause a denial of service
(buffer over-read and application crash) via a crafted length value in
conjunction with crafted serialized data in a phar archive, related to
the phar_parse_metadata and phar_parse_pharfile functions (bsc#928511).
– CVE-2015-2787: Use-after-free vulnerability in the process_nested_data
function in ext/standard/var_unserializer.re in PHP allowed remote
attackers to execute arbitrary code via a crafted unserialize call that
leverages use of the unset function within an __wakeup function, a
related issue to CVE-2015-0231 (bsc#924972).
– CVE-2014-9709: The GetCode_ function in gd_gif_in.c in GD 2.1.1 and
earlier, as used in PHP allowed remote attackers to cause a denial of
service (buffer over-read and application crash) via a crafted GIF image
that is improperly handled by the gdImageCreateFromGif function
(bsc#923945).
– CVE-2015-2301: Use-after-free vulnerability in the phar_rename_archive
function in phar_object.c in PHP allowed remote attackers to cause a
denial of service or possibly have unspecified other impact via vectors
that trigger an attempted renaming of a Phar archive to the name of an
existing file (bsc#922452).
– CVE-2015-2305: Integer overflow in the regcomp implementation in the
Henry Spencer BSD regex library (aka rxspencer) 32-bit platforms might
have allowed context-dependent attackers to execute arbitrary code via a
large regular expression that leads to a heap-based buffer overflow
(bsc#921950).
– CVE-2014-9705: Heap-based buffer overflow in the
enchant_broker_request_dict function in ext/enchant/enchant.c in PHP
allowed remote attackers to execute arbitrary code via vectors that
trigger creation of multiple dictionaries (bsc#922451).
– CVE-2015-0273: Multiple use-after-free vulnerabilities in
ext/date/php_date.c in PHP allowed remote attackers to execute arbitrary
code via crafted serialized input containing a (1) R or (2) r type
specifier in (a) DateTimeZone data handled by the
php_date_timezone_initialize_from_hash function or (b) DateTime data
handled by the php_date_initialize_from_hash function (bsc#918768).
– CVE-2014-9652: The mconvert function in softmagic.c in file as used in
the Fileinfo component in PHP did not properly handle a certain
string-length field during a copy of a truncated version of a Pascal
string, which might allowed remote attackers to cause a denial of
service (out-of-bounds memory access and application crash) via a
crafted file (bsc#917150).
– CVE-2014-8142: Use-after-free vulnerability in the process_nested_data
function in ext/standard/var_unserializer.re in PHP allowed remote
attackers to execute arbitrary code via a crafted unserialize call that
leverages improper handling of duplicate keys within the serialized
properties of an object, a different vulnerability than CVE-2004-1019
(bsc#910659).
– CVE-2015-0231: Use-after-free vulnerability in the process_nested_data
function in ext/standard/var_unserializer.re in PHP allowed remote
attackers to execute arbitrary code via a crafted unserialize call that
leverages improper handling of duplicate numerical keys within the
serialized properties of an object. NOTE: this vulnerability exists
because of an incomplete fix for CVE-2014-8142 (bsc#910659).
– CVE-2014-8142: Use-after-free vulnerability in the process_nested_data
function in ext/standard/var_unserializer.re in PHP allowed remote
attackers to execute arbitrary code via a crafted unserialize call that
leverages improper handling of duplicate keys within the serialized
properties of an object, a different vulnerability than CVE-2004-1019
(bsc#910659).
– CVE-2015-0232: The exif_process_unicode function in ext/exif/exif.c in
PHP allowed remote attackers to execute arbitrary code or cause a denial
of service (uninitialized pointer free and application crash) via
crafted EXIF data in a JPEG image (bsc#914690).
– CVE-2014-3670: The exif_ifd_make_value function in exif.c in the EXIF
extension in PHP operates on floating-point arrays incorrectly, which
allowed remote attackers to cause a denial of service (heap memory
corruption and application crash) or possibly execute arbitrary code via
a crafted JPEG image with TIFF thumbnail data that is improperly handled
by the exif_thumbnail function (bsc#902357).
– CVE-2014-3669: Integer overflow in the object_custom function in
ext/standard/var_unserializer.c in PHP allowed remote attackers to cause
a denial of service (application crash) or possibly execute arbitrary
code via an argument to the unserialize function that triggers
calculation of a large length value (bsc#902360).
– CVE-2014-3668: Buffer overflow in the date_from_ISO8601 function in the
mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in
PHP allowed remote attackers to cause a denial of service (application
crash) via (1) a crafted first argument to the xmlrpc_set_type function
or (2) a crafted argument to the xmlrpc_decode function, related to an
out-of-bounds read operation (bsc#902368).
– CVE-2014-5459: The PEAR_REST class in REST.php in PEAR in PHP allowed
local users to write to arbitrary files via a symlink attack on a (1)
rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to
the retrieveCacheFirst and useLocalCache functions (bsc#893849).
– CVE-2014-3597: Multiple buffer overflows in the php_parserr function in
ext/standard/dns.c in PHP allowed remote DNS servers to cause a denial
of service (application crash) or possibly execute arbitrary code via a
crafted DNS record, related to the dns_get_record function and the
dn_expand function. NOTE: this issue exists because of an incomplete fix
for CVE-2014-4049 (bsc#893853).
– CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in
the SPL component in PHP allowed context-dependent attackers to cause a
denial of service or possibly have unspecified other impact via crafted
iterator usage within applications in certain web-hosting environments
(bsc#886059).
– CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c in
the SPL component in PHP allowed context-dependent attackers to cause a
denial of service or possibly have unspecified other impact via crafted
ArrayIterator usage within applications in certain web-hosting
environments (bsc#886060).
– CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in PHP
did not ensure use of the string data type for the PHP_AUTH_PW,
PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might
allowed context-dependent attackers to obtain sensitive information from
process memory by using the integer data type with crafted values,
related to a “type confusion” vulnerability, as demonstrated by reading
a private SSL key in an Apache HTTP Server web-hosting environment with
mod_ssl and a PHP 5.3.x mod_php (bsc#885961).
– CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file as
used in the Fileinfo component in PHP allowed remote attackers to cause
a denial of service (assertion failure and application exit) via a
crafted CDF file (bsc#884986).
– CVE-2014-3478: Buffer overflow in the mconvert function in softmagic.c
in file as used in the Fileinfo component in PHP allowed remote
attackers to cause a denial of service (application crash) via a crafted
Pascal string in a FILE_PSTRING conversion (bsc#884987).
– CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file as
used in the Fileinfo component in PHP relies on incorrect sector-size
data, which allowed remote attackers to cause a denial of service
(application crash) via a crafted stream offset in a CDF file
(bsc#884989).
– CVE-2014-3480: The cdf_count_chain function in cdf.c in file as used in
the Fileinfo component in PHP did not properly validate sector-count
data, which allowed remote attackers to cause a denial of service
(application crash) via a crafted CDF file (bsc#884990).
– CVE-2014-3487: The cdf_read_property_info function in file as used in
the Fileinfo component in PHP did not properly validate a stream offset,
which allowed remote attackers to cause a denial of service (application
crash) via a crafted CDF file (bsc#884991).
– CVE-2014-3515: The SPL component in PHP incorrectly anticipates that
certain data structures will have the array data type after
unserialization, which allowed remote attackers to execute arbitrary
code via a crafted string that triggers use of a Hashtable destructor,
related to “type confusion” issues in (1) ArrayObject and (2)
SPLObjectStorage (bsc#884992).
These non-security issues were fixed:
– bnc#935074: compare with SQL_NULL_DATA correctly
– bnc#935074: fix segfault in odbc_fetch_array
– bnc#919080: fix timezone map
– bnc#925109: unserialize SoapClient type confusion
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-php53-12621=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
apache2-mod_php53-5.3.17-47.1
php53-5.3.17-47.1
php53-bcmath-5.3.17-47.1
php53-bz2-5.3.17-47.1
php53-calendar-5.3.17-47.1
php53-ctype-5.3.17-47.1
php53-curl-5.3.17-47.1
php53-dba-5.3.17-47.1
php53-dom-5.3.17-47.1
php53-exif-5.3.17-47.1
php53-fastcgi-5.3.17-47.1
php53-fileinfo-5.3.17-47.1
php53-ftp-5.3.17-47.1
php53-gd-5.3.17-47.1
php53-gettext-5.3.17-47.1
php53-gmp-5.3.17-47.1
php53-iconv-5.3.17-47.1
php53-intl-5.3.17-47.1
php53-json-5.3.17-47.1
php53-ldap-5.3.17-47.1
php53-mbstring-5.3.17-47.1
php53-mcrypt-5.3.17-47.1
php53-mysql-5.3.17-47.1
php53-odbc-5.3.17-47.1
php53-openssl-5.3.17-47.1
php53-pcntl-5.3.17-47.1
php53-pdo-5.3.17-47.1
php53-pear-5.3.17-47.1
php53-pgsql-5.3.17-47.1
php53-pspell-5.3.17-47.1
php53-shmop-5.3.17-47.1
php53-snmp-5.3.17-47.1
php53-soap-5.3.17-47.1
php53-suhosin-5.3.17-47.1
php53-sysvmsg-5.3.17-47.1
php53-sysvsem-5.3.17-47.1
php53-sysvshm-5.3.17-47.1
php53-tokenizer-5.3.17-47.1
php53-wddx-5.3.17-47.1
php53-xmlreader-5.3.17-47.1
php53-xmlrpc-5.3.17-47.1
php53-xmlwriter-5.3.17-47.1
php53-xsl-5.3.17-47.1
php53-zip-5.3.17-47.1
php53-zlib-5.3.17-47.1
References:
https://www.suse.com/security/cve/CVE-2004-1019.html
https://www.suse.com/security/cve/CVE-2006-7243.html
https://www.suse.com/security/cve/CVE-2014-0207.html
https://www.suse.com/security/cve/CVE-2014-3478.html
https://www.suse.com/security/cve/CVE-2014-3479.html
https://www.suse.com/security/cve/CVE-2014-3480.html
https://www.suse.com/security/cve/CVE-2014-3487.html
https://www.suse.com/security/cve/CVE-2014-3515.html
https://www.suse.com/security/cve/CVE-2014-3597.html
https://www.suse.com/security/cve/CVE-2014-3668.html
https://www.suse.com/security/cve/CVE-2014-3669.html
https://www.suse.com/security/cve/CVE-2014-3670.html
https://www.suse.com/security/cve/CVE-2014-4049.html
https://www.suse.com/security/cve/CVE-2014-4670.html
https://www.suse.com/security/cve/CVE-2014-4698.html
https://www.suse.com/security/cve/CVE-2014-4721.html
https://www.suse.com/security/cve/CVE-2014-5459.html
https://www.suse.com/security/cve/CVE-2014-8142.html
https://www.suse.com/security/cve/CVE-2014-9652.html
https://www.suse.com/security/cve/CVE-2014-9705.html
https://www.suse.com/security/cve/CVE-2014-9709.html
https://www.suse.com/security/cve/CVE-2014-9767.html
https://www.suse.com/security/cve/CVE-2015-0231.html
https://www.suse.com/security/cve/CVE-2015-0232.html
https://www.suse.com/security/cve/CVE-2015-0273.html
https://www.suse.com/security/cve/CVE-2015-1352.html
https://www.suse.com/security/cve/CVE-2015-2301.html
https://www.suse.com/security/cve/CVE-2015-2305.html
https://www.suse.com/security/cve/CVE-2015-2783.html
https://www.suse.com/security/cve/CVE-2015-2787.html
https://www.suse.com/security/cve/CVE-2015-3152.html
https://www.suse.com/security/cve/CVE-2015-3329.html
https://www.suse.com/security/cve/CVE-2015-3411.html
https://www.suse.com/security/cve/CVE-2015-3412.html
https://www.suse.com/security/cve/CVE-2015-4021.html
https://www.suse.com/security/cve/CVE-2015-4022.html
https://www.suse.com/security/cve/CVE-2015-4024.html
https://www.suse.com/security/cve/CVE-2015-4026.html
https://www.suse.com/security/cve/CVE-2015-4116.html
https://www.suse.com/security/cve/CVE-2015-4148.html
https://www.suse.com/security/cve/CVE-2015-4598.html
https://www.suse.com/security/cve/CVE-2015-4599.html
https://www.suse.com/security/cve/CVE-2015-4600.html
https://www.suse.com/security/cve/CVE-2015-4601.html
https://www.suse.com/security/cve/CVE-2015-4602.html
https://www.suse.com/security/cve/CVE-2015-4603.html
https://www.suse.com/security/cve/CVE-2015-4643.html
https://www.suse.com/security/cve/CVE-2015-4644.html
https://www.suse.com/security/cve/CVE-2015-5161.html
https://www.suse.com/security/cve/CVE-2015-5589.html
https://www.suse.com/security/cve/CVE-2015-5590.html
https://www.suse.com/security/cve/CVE-2015-6831.html
https://www.suse.com/security/cve/CVE-2015-6833.html
https://www.suse.com/security/cve/CVE-2015-6836.html
https://www.suse.com/security/cve/CVE-2015-6837.html
https://www.suse.com/security/cve/CVE-2015-6838.html
https://www.suse.com/security/cve/CVE-2015-7803.html
https://www.suse.com/security/cve/CVE-2015-8835.html
https://www.suse.com/security/cve/CVE-2015-8838.html
https://www.suse.com/security/cve/CVE-2015-8866.html
https://www.suse.com/security/cve/CVE-2015-8867.html
https://www.suse.com/security/cve/CVE-2015-8873.html
https://www.suse.com/security/cve/CVE-2015-8874.html
https://www.suse.com/security/cve/CVE-2015-8879.html
https://www.suse.com/security/cve/CVE-2016-2554.html
https://www.suse.com/security/cve/CVE-2016-3141.html
https://www.suse.com/security/cve/CVE-2016-3142.html
https://www.suse.com/security/cve/CVE-2016-3185.html
https://www.suse.com/security/cve/CVE-2016-4070.html
https://www.suse.com/security/cve/CVE-2016-4073.html
https://www.suse.com/security/cve/CVE-2016-4342.html
https://www.suse.com/security/cve/CVE-2016-4346.html
https://www.suse.com/security/cve/CVE-2016-4537.html
https://www.suse.com/security/cve/CVE-2016-4538.html
https://www.suse.com/security/cve/CVE-2016-4539.html
https://www.suse.com/security/cve/CVE-2016-4540.html
https://www.suse.com/security/cve/CVE-2016-4541.html
https://www.suse.com/security/cve/CVE-2016-4542.html
https://www.suse.com/security/cve/CVE-2016-4543.html
https://www.suse.com/security/cve/CVE-2016-4544.html
https://www.suse.com/security/cve/CVE-2016-5093.html
https://www.suse.com/security/cve/CVE-2016-5094.html
https://www.suse.com/security/cve/CVE-2016-5095.html
https://www.suse.com/security/cve/CVE-2016-5096.html
https://www.suse.com/security/cve/CVE-2016-5114.html
https://bugzilla.suse.com/884986
https://bugzilla.suse.com/884987
https://bugzilla.suse.com/884989
https://bugzilla.suse.com/884990
https://bugzilla.suse.com/884991
https://bugzilla.suse.com/884992
https://bugzilla.suse.com/885961
https://bugzilla.suse.com/886059
https://bugzilla.suse.com/886060
https://bugzilla.suse.com/893849
https://bugzilla.suse.com/893853
https://bugzilla.suse.com/902357
https://bugzilla.suse.com/902360
https://bugzilla.suse.com/902368
https://bugzilla.suse.com/910659
https://bugzilla.suse.com/914690
https://bugzilla.suse.com/917150
https://bugzilla.suse.com/918768
https://bugzilla.suse.com/919080
https://bugzilla.suse.com/921950
https://bugzilla.suse.com/922451
https://bugzilla.suse.com/922452
https://bugzilla.suse.com/923945
https://bugzilla.suse.com/924972
https://bugzilla.suse.com/925109
https://bugzilla.suse.com/928506
https://bugzilla.suse.com/928511
https://bugzilla.suse.com/931421
https://bugzilla.suse.com/931769
https://bugzilla.suse.com/931772
https://bugzilla.suse.com/931776
https://bugzilla.suse.com/933227
https://bugzilla.suse.com/935074
https://bugzilla.suse.com/935224
https://bugzilla.suse.com/935226
https://bugzilla.suse.com/935227
https://bugzilla.suse.com/935229
https://bugzilla.suse.com/935232
https://bugzilla.suse.com/935234
https://bugzilla.suse.com/935274
https://bugzilla.suse.com/935275
https://bugzilla.suse.com/938719
https://bugzilla.suse.com/938721
https://bugzilla.suse.com/942291
https://bugzilla.suse.com/942296
https://bugzilla.suse.com/945412
https://bugzilla.suse.com/945428
https://bugzilla.suse.com/949961
https://bugzilla.suse.com/968284
https://bugzilla.suse.com/969821
https://bugzilla.suse.com/971611
https://bugzilla.suse.com/971612
https://bugzilla.suse.com/971912
https://bugzilla.suse.com/973351
https://bugzilla.suse.com/973792
https://bugzilla.suse.com/976996
https://bugzilla.suse.com/976997
https://bugzilla.suse.com/977003
https://bugzilla.suse.com/977005
https://bugzilla.suse.com/977991
https://bugzilla.suse.com/977994
https://bugzilla.suse.com/978827
https://bugzilla.suse.com/978828
https://bugzilla.suse.com/978829
https://bugzilla.suse.com/978830
https://bugzilla.suse.com/980366
https://bugzilla.suse.com/980373
https://bugzilla.suse.com/980375
https://bugzilla.suse.com/981050
https://bugzilla.suse.com/982010
https://bugzilla.suse.com/982011
https://bugzilla.suse.com/982012
https://bugzilla.suse.com/982013
https://bugzilla.suse.com/982162
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org