{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-mod_php5":"5.5.14-56.1","php5":"5.5.14-56.1","php5-bcmath":"5.5.14-56.1","php5-bz2":"5.5.14-56.1","php5-calendar":"5.5.14-56.1","php5-ctype":"5.5.14-56.1","php5-curl":"5.5.14-56.1","php5-dba":"5.5.14-56.1","php5-dom":"5.5.14-56.1","php5-enchant":"5.5.14-56.1","php5-exif":"5.5.14-56.1","php5-fastcgi":"5.5.14-56.1","php5-fileinfo":"5.5.14-56.1","php5-fpm":"5.5.14-56.1","php5-ftp":"5.5.14-56.1","php5-gd":"5.5.14-56.1","php5-gettext":"5.5.14-56.1","php5-gmp":"5.5.14-56.1","php5-iconv":"5.5.14-56.1","php5-intl":"5.5.14-56.1","php5-json":"5.5.14-56.1","php5-ldap":"5.5.14-56.1","php5-mbstring":"5.5.14-56.1","php5-mcrypt":"5.5.14-56.1","php5-mysql":"5.5.14-56.1","php5-odbc":"5.5.14-56.1","php5-opcache":"5.5.14-56.1","php5-openssl":"5.5.14-56.1","php5-pcntl":"5.5.14-56.1","php5-pdo":"5.5.14-56.1","php5-pear":"5.5.14-56.1","php5-pgsql":"5.5.14-56.1","php5-phar":"5.5.14-56.1","php5-posix":"5.5.14-56.1","php5-pspell":"5.5.14-56.1","php5-shmop":"5.5.14-56.1","php5-snmp":"5.5.14-56.1","php5-soap":"5.5.14-56.1","php5-sockets":"5.5.14-56.1","php5-sqlite":"5.5.14-56.1","php5-suhosin":"5.5.14-56.1","php5-sysvmsg":"5.5.14-56.1","php5-sysvsem":"5.5.14-56.1","php5-sysvshm":"5.5.14-56.1","php5-tokenizer":"5.5.14-56.1","php5-wddx":"5.5.14-56.1","php5-xmlreader":"5.5.14-56.1","php5-xmlrpc":"5.5.14-56.1","php5-xmlwriter":"5.5.14-56.1","php5-xsl":"5.5.14-56.1","php5-zip":"5.5.14-56.1","php5-zlib":"5.5.14-56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 12","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"php5-devel":"5.5.14-56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"php5-devel":"5.5.14-56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-56.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for php5 fixes the following security issues:\n\n- CVE-2016-4073: A remote attacker could have caused denial of service, or possibly execute arbitrary code, due to incorrect handling of string length calculations in mb_strcut() (bsc#977003)\n- CVE-2015-8867: The PHP function openssl_random_pseudo_bytes() did not return cryptographically secure random bytes (bsc#977005)\n- CVE-2016-4070: The libxml_disable_entity_loader() setting was shared between threads, which could have resulted in XML external entity injection and entity expansion issues (bsc#976997)\n- CVE-2015-8866: A remote attacker could have caused denial of service due to incorrect handling of large strings in php_raw_url_encode() (bsc#976996)\n- CVE-2016-4071: A remote attacker could have caused denial of service, or possibly execute arbitrary code, due to incorrect handling of string formatting in php_snmp_error() (bsc#977000)\n","id":"SUSE-SU-2016:1277-1","modified":"2016-05-11T12:38:12Z","published":"2016-05-11T12:38:12Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20161277-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/976996"},{"type":"REPORT","url":"https://bugzilla.suse.com/976997"},{"type":"REPORT","url":"https://bugzilla.suse.com/977000"},{"type":"REPORT","url":"https://bugzilla.suse.com/977003"},{"type":"REPORT","url":"https://bugzilla.suse.com/977005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-4070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-4071"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-4073"}],"related":["CVE-2015-8866","CVE-2015-8867","CVE-2016-4070","CVE-2016-4071","CVE-2016-4073"],"summary":"Security update for php5","upstream":["CVE-2015-8866","CVE-2015-8867","CVE-2016-4070","CVE-2016-4071","CVE-2016-4073"]}