{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-mod_php5":"5.5.14-30.1","php5":"5.5.14-30.1","php5-bcmath":"5.5.14-30.1","php5-bz2":"5.5.14-30.1","php5-calendar":"5.5.14-30.1","php5-ctype":"5.5.14-30.1","php5-curl":"5.5.14-30.1","php5-dba":"5.5.14-30.1","php5-dom":"5.5.14-30.1","php5-enchant":"5.5.14-30.1","php5-exif":"5.5.14-30.1","php5-fastcgi":"5.5.14-30.1","php5-fileinfo":"5.5.14-30.1","php5-fpm":"5.5.14-30.1","php5-ftp":"5.5.14-30.1","php5-gd":"5.5.14-30.1","php5-gettext":"5.5.14-30.1","php5-gmp":"5.5.14-30.1","php5-iconv":"5.5.14-30.1","php5-intl":"5.5.14-30.1","php5-json":"5.5.14-30.1","php5-ldap":"5.5.14-30.1","php5-mbstring":"5.5.14-30.1","php5-mcrypt":"5.5.14-30.1","php5-mysql":"5.5.14-30.1","php5-odbc":"5.5.14-30.1","php5-openssl":"5.5.14-30.1","php5-pcntl":"5.5.14-30.1","php5-pdo":"5.5.14-30.1","php5-pear":"5.5.14-30.1","php5-pgsql":"5.5.14-30.1","php5-pspell":"5.5.14-30.1","php5-shmop":"5.5.14-30.1","php5-snmp":"5.5.14-30.1","php5-soap":"5.5.14-30.1","php5-sockets":"5.5.14-30.1","php5-sqlite":"5.5.14-30.1","php5-suhosin":"5.5.14-30.1","php5-sysvmsg":"5.5.14-30.1","php5-sysvsem":"5.5.14-30.1","php5-sysvshm":"5.5.14-30.1","php5-tokenizer":"5.5.14-30.1","php5-wddx":"5.5.14-30.1","php5-xmlreader":"5.5.14-30.1","php5-xmlrpc":"5.5.14-30.1","php5-xmlwriter":"5.5.14-30.1","php5-xsl":"5.5.14-30.1","php5-zip":"5.5.14-30.1","php5-zlib":"5.5.14-30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 12","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This security update of PHP fixes the following issues:\n\nSecurity issues fixed:\n\n* CVE-2015-4024 [bnc#931421]: Fixed multipart/form-data remote DOS Vulnerability.\n* CVE-2015-4026 [bnc#931776]: pcntl_exec() did not check path validity.\n* CVE-2015-4022 [bnc#931772]: Fixed and overflow in ftp_genlist() that resulted in a heap overflow.\n* CVE-2015-4021 [bnc#931769]: Fixed memory corruption in phar_parse_tarfile when entry filename starts with NULL.\n* CVE-2015-4148 [bnc#933227]: Fixed SoapClient's do_soap_call() type confusion after unserialize() information disclosure.\n* CVE-2015-4602 [bnc#935224]: Fixed an incomplete Class unserialization type confusion.\n* CVE-2015-4599, CVE-2015-4600, CVE-2015-4601 [bnc#935226]: Fixed type confusion issues in unserialize() with various SOAP methods.\n* CVE-2015-4603 [bnc#935234]: Fixed exception::getTraceAsString type confusion issue after unserialize.\n* CVE-2015-4644 [bnc#935274]: Fixed a crash in php_pgsql_meta_data.\n* CVE-2015-4643 [bnc#935275]: Fixed an integer overflow in ftp_genlist() that could result in a heap overflow.\n* CVE-2015-3411, CVE-2015-3412, CVE-2015-4598 [bnc#935227], [bnc#935232]: Added missing null byte checks for paths in various PHP extensions.\n\nBugs fixed:\n\n* configure php-fpm with --localstatedir=/var [bnc#927147]\n* fix timezone map [bnc#919080]\n","id":"SUSE-SU-2015:1253-2","modified":"2015-06-23T06:21:14Z","published":"2015-06-23T06:21:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20151253-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/919080"},{"type":"REPORT","url":"https://bugzilla.suse.com/927147"},{"type":"REPORT","url":"https://bugzilla.suse.com/931421"},{"type":"REPORT","url":"https://bugzilla.suse.com/931769"},{"type":"REPORT","url":"https://bugzilla.suse.com/931772"},{"type":"REPORT","url":"https://bugzilla.suse.com/931776"},{"type":"REPORT","url":"https://bugzilla.suse.com/933227"},{"type":"REPORT","url":"https://bugzilla.suse.com/935224"},{"type":"REPORT","url":"https://bugzilla.suse.com/935226"},{"type":"REPORT","url":"https://bugzilla.suse.com/935227"},{"type":"REPORT","url":"https://bugzilla.suse.com/935232"},{"type":"REPORT","url":"https://bugzilla.suse.com/935234"},{"type":"REPORT","url":"https://bugzilla.suse.com/935274"},{"type":"REPORT","url":"https://bugzilla.suse.com/935275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3411"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3412"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4643"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4644"}],"related":["CVE-2015-3411","CVE-2015-3412","CVE-2015-4021","CVE-2015-4022","CVE-2015-4024","CVE-2015-4026","CVE-2015-4148","CVE-2015-4598","CVE-2015-4599","CVE-2015-4600","CVE-2015-4601","CVE-2015-4602","CVE-2015-4603","CVE-2015-4643","CVE-2015-4644"],"summary":"Security update for php5","upstream":["CVE-2015-3411","CVE-2015-3412","CVE-2015-4021","CVE-2015-4022","CVE-2015-4024","CVE-2015-4026","CVE-2015-4148","CVE-2015-4598","CVE-2015-4599","CVE-2015-4600","CVE-2015-4601","CVE-2015-4602","CVE-2015-4603","CVE-2015-4643","CVE-2015-4644"]}