[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 533-1] php5 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : php5
Version        : 5.4.45-0+deb7u4
CVE ID         : CVE-2016-5093 CVE-2016-5094 CVE-2016-5095 CVE-2016-5096
PHP bugs       : 70661 70728 70741 70480

   * CVE-2016-5093.patch
     Absence of null character causes unexpected zend_string length and
     leaks heap memory. The test script uses locale_get_primary_language
     to reach get_icu_value_internal but there are some other functions
     that also trigger this issue:
       locale_canonicalize, locale_filter_matches,
       locale_lookup, locale_parse
   * CVE-2016-5094.patch
     don't create strings with lengths outside int range
   * CVE-2016-5095.patch
     similar to CVE-2016-5094
     don't create strings with lengths outside int range
   * CVE-2016-5096.patch
     int/size_t confusion in fread
   * CVE-TEMP-bug-70661.patch
     bug70661: Use After Free Vulnerability in WDDX Packet Deserialization
   * CVE-TEMP-bug-70728.patch
     bug70728: Type Confusion Vulnerability in PHP_to_XMLRPC_worker()
   * CVE-TEMP-bug-70741.patch
     bug70741: Session WDDX Packet Deserialization Type Confusion
               Vulnerability
   * CVE-TEMP-bug-70480-raw.patch
     bug70480: php_url_parse_ex() buffer overflow read


For Debian 7 "Wheezy", these problems have been fixed in version
5.4.45-0+deb7u4.

We recommend that you upgrade your php5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQJ8BAEBCgBmBQJXdA7VXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5
NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHcVoP/jRHCtJzbkkkLwmrK2iylUP9
zes/OJm8G4wUJfPbIT0NSmzU8bycNNdsMyzhT9kOmJNE4Z01y+TDJkWVqtbXonBH
IZWACOWHPqlybk6zeb3f4AjSatZF7ZxrDcfsIK2oD4f1UsrLXYzxlcNVCeX7icB2
jL6rSzg4uuwlFpM9qyv1ROM7rU2sD2E9iDzovk7JoMcELKL41BaA+BYYexXIh2jO
SMf0/UEsVLUPE3TIxoI3GYFK/uVzZ8P84inUKPAZcn0IaMgmgAqx6Sr/lC/w+0mq
dOtKidhOmpgbCziPSbCgB3VYUQiDOz460CGL5LWRJWRsqWARGEaJ4IC8DQxCpd+F
3VsRbpHmw31F5eeKzWvp2G4NkBlPVBS/gDwQwbjZV1Ru34HBGtEcnxkBbruEqeIK
LykmQSf8bvrZD4FanugfDWWuNRHgFyDTnZkNUtd9cK1yzeCoCvOrNcJGmMfrKMbD
KDoCDtYHy/ODIe8M4x9kMBQSTicWwDnUNCg2M0+idtCktT4RoCCM8CUgd+DhiYOG
w+gQLfr8851HlvCXWJc/SwlxedDTxkHu4eijRg6eh5DN1bTNC9LQJxEdYVCWOwLE
J4MzX3L4a53T/4BgLwRlKQ3AOrVRS9e8b9qWS46uBWQB1Jg9feAONDlFPW2xHhdV
7hExssnDt9BvC8rc24ML
=+nBJ
-----END PGP SIGNATURE-----


Reply to: