{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-mod_php5":"5.5.14-73.1","php5":"5.5.14-73.1","php5-bcmath":"5.5.14-73.1","php5-bz2":"5.5.14-73.1","php5-calendar":"5.5.14-73.1","php5-ctype":"5.5.14-73.1","php5-curl":"5.5.14-73.1","php5-dba":"5.5.14-73.1","php5-dom":"5.5.14-73.1","php5-enchant":"5.5.14-73.1","php5-exif":"5.5.14-73.1","php5-fastcgi":"5.5.14-73.1","php5-fileinfo":"5.5.14-73.1","php5-fpm":"5.5.14-73.1","php5-ftp":"5.5.14-73.1","php5-gd":"5.5.14-73.1","php5-gettext":"5.5.14-73.1","php5-gmp":"5.5.14-73.1","php5-iconv":"5.5.14-73.1","php5-imap":"5.5.14-73.1","php5-intl":"5.5.14-73.1","php5-json":"5.5.14-73.1","php5-ldap":"5.5.14-73.1","php5-mbstring":"5.5.14-73.1","php5-mcrypt":"5.5.14-73.1","php5-mysql":"5.5.14-73.1","php5-odbc":"5.5.14-73.1","php5-opcache":"5.5.14-73.1","php5-openssl":"5.5.14-73.1","php5-pcntl":"5.5.14-73.1","php5-pdo":"5.5.14-73.1","php5-pear":"5.5.14-73.1","php5-pgsql":"5.5.14-73.1","php5-phar":"5.5.14-73.1","php5-posix":"5.5.14-73.1","php5-pspell":"5.5.14-73.1","php5-shmop":"5.5.14-73.1","php5-snmp":"5.5.14-73.1","php5-soap":"5.5.14-73.1","php5-sockets":"5.5.14-73.1","php5-sqlite":"5.5.14-73.1","php5-suhosin":"5.5.14-73.1","php5-sysvmsg":"5.5.14-73.1","php5-sysvsem":"5.5.14-73.1","php5-sysvshm":"5.5.14-73.1","php5-tokenizer":"5.5.14-73.1","php5-wddx":"5.5.14-73.1","php5-xmlreader":"5.5.14-73.1","php5-xmlrpc":"5.5.14-73.1","php5-xmlwriter":"5.5.14-73.1","php5-xsl":"5.5.14-73.1","php5-zip":"5.5.14-73.1","php5-zlib":"5.5.14-73.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 12","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-73.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"php5-devel":"5.5.14-73.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-73.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for php5 fixes the following security issues:\n\n* CVE-2016-6128: Invalid color index not properly handled [bsc#987580]\n* CVE-2016-6161: global out of bounds read when encoding gif from malformed input withgd2togif [bsc#988032]\n* CVE-2016-6292: Null pointer dereference in exif_process_user_comment [bsc#991422]\n* CVE-2016-6295: Use after free in SNMP with GC and unserialize() [bsc#991424]\n* CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426]\n* CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427]\n* CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428]\n* CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429]\n* CVE-2016-5399: Improper error handling in bzread() [bsc#991430]\n* CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437]\n* CVE-2016-6207: Integer overflow error within _gdContributionsAlloc() [bsc#991434]\n* CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530]\n* CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433]\n* CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization\n* CVE-2016-7125: PHP Session Data Injection Vulnerability\n* CVE-2016-7126: select_colors write out-of-bounds\n* CVE-2016-7127: imagegammacorrect allowed arbitrary write access\n* CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF\n* CVE-2016-7129: wddx_deserialize allowed illegal memory access\n* CVE-2016-7130: wddx_deserialize null dereference\n* CVE-2016-7131: wddx_deserialize null dereference with invalid xml\n* CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element\n* CVE-2016-7134: Heap overflow in the function curl_escape\n","id":"SUSE-SU-2016:2408-1","modified":"2016-09-28T09:32:31Z","published":"2016-09-28T09:32:31Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162408-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/987530"},{"type":"REPORT","url":"https://bugzilla.suse.com/987580"},{"type":"REPORT","url":"https://bugzilla.suse.com/988032"},{"type":"REPORT","url":"https://bugzilla.suse.com/991422"},{"type":"REPORT","url":"https://bugzilla.suse.com/991424"},{"type":"REPORT","url":"https://bugzilla.suse.com/991426"},{"type":"REPORT","url":"https://bugzilla.suse.com/991427"},{"type":"REPORT","url":"https://bugzilla.suse.com/991428"},{"type":"REPORT","url":"https://bugzilla.suse.com/991429"},{"type":"REPORT","url":"https://bugzilla.suse.com/991430"},{"type":"REPORT","url":"https://bugzilla.suse.com/991433"},{"type":"REPORT","url":"https://bugzilla.suse.com/991434"},{"type":"REPORT","url":"https://bugzilla.suse.com/991437"},{"type":"REPORT","url":"https://bugzilla.suse.com/997206"},{"type":"REPORT","url":"https://bugzilla.suse.com/997207"},{"type":"REPORT","url":"https://bugzilla.suse.com/997208"},{"type":"REPORT","url":"https://bugzilla.suse.com/997210"},{"type":"REPORT","url":"https://bugzilla.suse.com/997211"},{"type":"REPORT","url":"https://bugzilla.suse.com/997220"},{"type":"REPORT","url":"https://bugzilla.suse.com/997225"},{"type":"REPORT","url":"https://bugzilla.suse.com/997230"},{"type":"REPORT","url":"https://bugzilla.suse.com/997248"},{"type":"REPORT","url":"https://bugzilla.suse.com/997257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-3587"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-3587"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6128"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6207"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6291"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6297"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7128"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7134"}],"related":["CVE-2014-3587","CVE-2016-3587","CVE-2016-5399","CVE-2016-6128","CVE-2016-6161","CVE-2016-6207","CVE-2016-6288","CVE-2016-6289","CVE-2016-6290","CVE-2016-6291","CVE-2016-6292","CVE-2016-6295","CVE-2016-6296","CVE-2016-6297","CVE-2016-7124","CVE-2016-7125","CVE-2016-7126","CVE-2016-7127","CVE-2016-7128","CVE-2016-7129","CVE-2016-7130","CVE-2016-7131","CVE-2016-7132","CVE-2016-7134"],"summary":"Security update for php5","upstream":["CVE-2014-3587","CVE-2016-3587","CVE-2016-5399","CVE-2016-6128","CVE-2016-6161","CVE-2016-6207","CVE-2016-6288","CVE-2016-6289","CVE-2016-6290","CVE-2016-6291","CVE-2016-6292","CVE-2016-6295","CVE-2016-6296","CVE-2016-6297","CVE-2016-7124","CVE-2016-7125","CVE-2016-7126","CVE-2016-7127","CVE-2016-7128","CVE-2016-7129","CVE-2016-7130","CVE-2016-7131","CVE-2016-7132","CVE-2016-7134"]}