{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-mod_php5":"5.5.14-53.1","php5":"5.5.14-53.1","php5-bcmath":"5.5.14-53.1","php5-bz2":"5.5.14-53.1","php5-calendar":"5.5.14-53.1","php5-ctype":"5.5.14-53.1","php5-curl":"5.5.14-53.1","php5-dba":"5.5.14-53.1","php5-dom":"5.5.14-53.1","php5-enchant":"5.5.14-53.1","php5-exif":"5.5.14-53.1","php5-fastcgi":"5.5.14-53.1","php5-fileinfo":"5.5.14-53.1","php5-fpm":"5.5.14-53.1","php5-ftp":"5.5.14-53.1","php5-gd":"5.5.14-53.1","php5-gettext":"5.5.14-53.1","php5-gmp":"5.5.14-53.1","php5-iconv":"5.5.14-53.1","php5-intl":"5.5.14-53.1","php5-json":"5.5.14-53.1","php5-ldap":"5.5.14-53.1","php5-mbstring":"5.5.14-53.1","php5-mcrypt":"5.5.14-53.1","php5-mysql":"5.5.14-53.1","php5-odbc":"5.5.14-53.1","php5-opcache":"5.5.14-53.1","php5-openssl":"5.5.14-53.1","php5-pcntl":"5.5.14-53.1","php5-pdo":"5.5.14-53.1","php5-pear":"5.5.14-53.1","php5-pgsql":"5.5.14-53.1","php5-posix":"5.5.14-53.1","php5-pspell":"5.5.14-53.1","php5-shmop":"5.5.14-53.1","php5-snmp":"5.5.14-53.1","php5-soap":"5.5.14-53.1","php5-sockets":"5.5.14-53.1","php5-sqlite":"5.5.14-53.1","php5-suhosin":"5.5.14-53.1","php5-sysvmsg":"5.5.14-53.1","php5-sysvsem":"5.5.14-53.1","php5-sysvshm":"5.5.14-53.1","php5-tokenizer":"5.5.14-53.1","php5-wddx":"5.5.14-53.1","php5-xmlreader":"5.5.14-53.1","php5-xmlrpc":"5.5.14-53.1","php5-xmlwriter":"5.5.14-53.1","php5-xsl":"5.5.14-53.1","php5-zip":"5.5.14-53.1","php5-zlib":"5.5.14-53.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 12","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-53.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"php5-devel":"5.5.14-53.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-53.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"php5-devel":"5.5.14-53.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-53.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for php5 fixes the following security issues:\n\n- CVE-2015-8838: mysqlnd was vulnerable to BACKRONYM (bnc#973792).\n- CVE-2015-8835: SoapClient s_call method suffered from a type confusion issue that could have lead to crashes [bsc#973351]\n- CVE-2016-2554: A NULL pointer dereference in phar_get_fp_offset could lead to crashes. [bsc#968284]\n  Note: we do not ship the phar extension currently, so we are not affected.\n- CVE-2016-3141: A use-after-free / double-free in the WDDX\n  deserialization could lead to crashes or potential code\n  execution. [bsc#969821]\n- CVE-2016-3142: An Out-of-bounds read in phar_parse_zipfile() could lead to crashes. [bsc#971912]\n  Note: we do not ship the phar extension currently, so we are not affected.\n- CVE-2014-9767: A directory traversal when extracting zip files was fixed that could lead to\n  overwritten files. [bsc#971612]\n- CVE-2016-3185: A type confusion vulnerability in\n  make_http_soap_request() could lead to crashes or potentially code\n  execution. [bsc#971611]\n","id":"SUSE-SU-2016:1166-1","modified":"2016-04-27T14:46:35Z","published":"2016-04-27T14:46:35Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20161166-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/968284"},{"type":"REPORT","url":"https://bugzilla.suse.com/969821"},{"type":"REPORT","url":"https://bugzilla.suse.com/971611"},{"type":"REPORT","url":"https://bugzilla.suse.com/971612"},{"type":"REPORT","url":"https://bugzilla.suse.com/971912"},{"type":"REPORT","url":"https://bugzilla.suse.com/973351"},{"type":"REPORT","url":"https://bugzilla.suse.com/973792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8838"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2554"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-3141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-3142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-3185"}],"related":["CVE-2014-9767","CVE-2015-8835","CVE-2015-8838","CVE-2016-2554","CVE-2016-3141","CVE-2016-3142","CVE-2016-3185"],"summary":"Security update for php5","upstream":["CVE-2014-9767","CVE-2015-8835","CVE-2015-8838","CVE-2016-2554","CVE-2016-3141","CVE-2016-3142","CVE-2016-3185"]}