{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-mod_php5":"5.5.14-96.1","php5":"5.5.14-96.1","php5-bcmath":"5.5.14-96.1","php5-bz2":"5.5.14-96.1","php5-calendar":"5.5.14-96.1","php5-ctype":"5.5.14-96.1","php5-curl":"5.5.14-96.1","php5-dba":"5.5.14-96.1","php5-dom":"5.5.14-96.1","php5-enchant":"5.5.14-96.1","php5-exif":"5.5.14-96.1","php5-fastcgi":"5.5.14-96.1","php5-fileinfo":"5.5.14-96.1","php5-fpm":"5.5.14-96.1","php5-ftp":"5.5.14-96.1","php5-gd":"5.5.14-96.1","php5-gettext":"5.5.14-96.1","php5-gmp":"5.5.14-96.1","php5-iconv":"5.5.14-96.1","php5-imap":"5.5.14-96.1","php5-intl":"5.5.14-96.1","php5-json":"5.5.14-96.1","php5-ldap":"5.5.14-96.1","php5-mbstring":"5.5.14-96.1","php5-mcrypt":"5.5.14-96.1","php5-mysql":"5.5.14-96.1","php5-odbc":"5.5.14-96.1","php5-opcache":"5.5.14-96.1","php5-openssl":"5.5.14-96.1","php5-pcntl":"5.5.14-96.1","php5-pdo":"5.5.14-96.1","php5-pear":"5.5.14-96.1","php5-pgsql":"5.5.14-96.1","php5-phar":"5.5.14-96.1","php5-posix":"5.5.14-96.1","php5-pspell":"5.5.14-96.1","php5-shmop":"5.5.14-96.1","php5-snmp":"5.5.14-96.1","php5-soap":"5.5.14-96.1","php5-sockets":"5.5.14-96.1","php5-sqlite":"5.5.14-96.1","php5-suhosin":"5.5.14-96.1","php5-sysvmsg":"5.5.14-96.1","php5-sysvsem":"5.5.14-96.1","php5-sysvshm":"5.5.14-96.1","php5-tokenizer":"5.5.14-96.1","php5-wddx":"5.5.14-96.1","php5-xmlreader":"5.5.14-96.1","php5-xmlrpc":"5.5.14-96.1","php5-xmlwriter":"5.5.14-96.1","php5-xsl":"5.5.14-96.1","php5-zip":"5.5.14-96.1","php5-zlib":"5.5.14-96.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Web and Scripting 12","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-96.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"php5-devel":"5.5.14-96.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-96.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"php5-devel":"5.5.14-96.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"php5","purl":"pkg:rpm/suse/php5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.5.14-96.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for php5 fixes the following issues:\n\n- CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite\n  loop, causing denial of service (bsc#1019550)\n- CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c\n  in PHP allowed remote attackers to cause a denial of service (application\n  crash) via crafted EXIF data that triggers an attempt to divide the\n  minimum representable negative integer by -1.  (bsc#1022219)\n- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function\n  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial\n  of service (memory consumption or application crash) via a truncated\n  manifest entry in a PHAR archive. (bsc#1022255)\n- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function\n  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial\n  of service (memory corruption) or possibly execute arbitrary code via\n  a crafted PHAR archive with an alias mismatch. (bsc#1022257)\n- CVE-2016-10161: The object_common1 function in\n  ext/standard/var_unserializer.c in PHP allowed remote attackers to\n  cause a denial of service (buffer over-read and application crash) via\n  crafted serialized data that is mishandled in a finish_nested_data call.\n  (bsc#1022260)\n- CVE-2016-10166: A potential unsigned underflow in gd interpolation\n  functions could lead to memory corruption in the PHP gd module\n  (bsc#1022263)\n- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()\n  could lead to php out of memory even on small files. (bsc#1022264)\n- CVE-2016-10168: A signed integer overflow in the gd module could lead\n  to memory corruption (bsc#1022265)\n","id":"SUSE-SU-2017:0556-1","modified":"2017-02-23T09:00:51Z","published":"2017-02-23T09:00:51Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170556-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022219"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022257"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022263"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10168"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7478"}],"related":["CVE-2016-10158","CVE-2016-10159","CVE-2016-10160","CVE-2016-10161","CVE-2016-10166","CVE-2016-10167","CVE-2016-10168","CVE-2016-7478"],"summary":"Security update for php5","upstream":["CVE-2016-10158","CVE-2016-10159","CVE-2016-10160","CVE-2016-10161","CVE-2016-10166","CVE-2016-10167","CVE-2016-10168","CVE-2016-7478"]}