aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts/security/2016/dla-628.wml
blob: bee11bfa89936e3ed2750538f9200b9b3124a28e (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<ul>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4473">CVE-2016-4473</a>
      <p>An invalid free may occur under certain conditions when processing
      phar-compatible archives.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4538">CVE-2016-4538</a>
      <p>The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35,
      5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer
      for the scale argument, which allows remote attackers to cause a
      denial of service or possibly have unspecified other impact via a
      crafted call.
      (already fixed with patch for <a href="https://security-tracker.debian.org/tracker/CVE-2016-4537">CVE-2016-4537</a>)</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5114">CVE-2016-5114</a>
      <p>sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17,
      and 7.x before 7.0.2 misinterprets the semantics of the snprintf
      return value, which allows attackers to obtain sensitive information
      from process memory or cause a denial of service (out-of-bounds read
      and buffer overflow) via a long string, as demonstrated by a long URI
      in a configuration with custom REQUEST_URI logging.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5399">CVE-2016-5399</a>
      <p>Improper error handling in bzread()</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5768">CVE-2016-5768</a>
      <p>Double free vulnerability in the _php_mb_regex_ereg_replace_exec
      function in php_mbregex.c in the mbstring extension in PHP before
      5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote
      attackers to execute arbitrary code or cause a denial of service
      (application crash) by leveraging a callback exception.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5769">CVE-2016-5769</a>
      <p>Multiple integer overflows in mcrypt.c in the mcrypt extension in
      PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow
      remote attackers to cause a denial of service (heap-based buffer
      overflow and application crash) or possibly have unspecified other
      impact via a crafted length value, related to the
      (1) mcrypt_generic and (2) mdecrypt_generic functions.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5770">CVE-2016-5770</a>
      <p>Integer overflow in the SplFileObject::fread function in
      spl_directory.c in the SPL extension in PHP before 5.5.37 and
      5.6.x before 5.6.23 allows remote attackers to cause a denial
      of service or possibly have unspecified other impact via a
      large integer argument, a related issue to <a href="https://security-tracker.debian.org/tracker/CVE-2016-5096">CVE-2016-5096</a>.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5771">CVE-2016-5771</a>
      <p>spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x
      before 5.6.23 improperly interacts with the unserialize
      implementation and garbage collection, which allows remote
      attackers to execute arbitrary code or cause a denial of service
      (use-after-free and application crash) via crafted serialized data.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5772">CVE-2016-5772</a>
      <p>Double free vulnerability in the php_wddx_process_data function in
      wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before
      5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a
      denial of service (application crash) or possibly execute arbitrary
      code via crafted XML data that is mishandled in a wddx_deserialize
      call.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5773">CVE-2016-5773</a>
      <p>php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before
      5.6.23, and 7.x before 7.0.8 improperly interacts with the
      unserialize implementation and garbage collection, which allows
      remote attackers to execute arbitrary code or cause a denial of
      service (use-after-free and application crash) via crafted
      serialized data containing a ZipArchive object.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6289">CVE-2016-6289</a>
      <p>Integer overflow in the virtual_file_ex function in
      TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24,
      and 7.x before 7.0.9 allows remote attackers to cause a denial of
      service (stack-based buffer overflow) or possibly have unspecified
      other impact via a crafted extract operation on a ZIP archive.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6290">CVE-2016-6290</a>
      <p>ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24,
      and 7.x before 7.0.9 does not properly maintain a certain hash
      data structure, which allows remote attackers to cause a denial
      of service (use-after-free) or possibly have unspecified other
      impact via vectors related to session deserialization.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6291">CVE-2016-6291</a>
      <p>The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in
      PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows
      remote attackers to cause a denial of service (out-of-bounds array
      access and memory corruption), obtain sensitive information from
      process memory, or possibly have unspecified other impact via a
      crafted JPEG image.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6292">CVE-2016-6292</a>
      <p>The exif_process_user_comment function in ext/exif/exif.c in PHP
      before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows
      remote attackers to cause a denial of service (NULL pointer
      dereference and application crash) via a crafted JPEG image.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6294">CVE-2016-6294</a>
      <p>The locale_accept_from_http function in
      ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before
      5.6.24, and 7.x before 7.0.9 does not properly restrict calls to
      the ICU uloc_acceptLanguageFromHTTP function, which allows remote
      attackers to cause a denial of service (out-of-bounds read) or
      possibly have unspecified other impact via a call with a long argument.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6295">CVE-2016-6295</a>
      <p>ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x
      before 7.0.9 improperly interacts with the unserialize implementation
      and garbage collection, which allows remote attackers to cause a
      denial of service (use-after-free and application crash) or possibly
      have unspecified other impact via crafted serialized data, a related
      issue to <a href="https://security-tracker.debian.org/tracker/CVE-2016-5773">CVE-2016-5773</a>.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6296">CVE-2016-6296</a>
      <p>Integer signedness error in the simplestring_addn function in
      simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before
      5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote
      attackers to cause a denial of service (heap-based buffer overflow)
      or possibly have unspecified other impact via a long first argument
      to the PHP xmlrpc_encode_request function.</p></li>

    <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6297">CVE-2016-6297</a>
      <p>Integer overflow in the php_stream_zip_opener function in
      ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and
      7.x before 7.0.9 allows remote attackers to cause a denial of
      service (stack-based buffer overflow) or possibly have unspecified
      other impact via a crafted zip:// URL.</p></li>

    <li>BUG-70436
      <p>Use After Free Vulnerability in unserialize()</p></li>

    <li>BUG-72681
      <p>PHP Session Data Injection Vulnerability, consume data even if we're
      not storing them.</p></li>

</ul>

<p>For Debian 7 <q>Wheezy</q>, these issues have been fixed in php5 version 5.4.45-0+deb7u5</p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2016/dla-628.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy