Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2016-5766: php5,php53: Integer Overflow in _gd2GetHeader() resulting in heap overflow | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | astieger, krahmer, pgajdos, smash_bz |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/170460/ | ||
Whiteboard: | CVSSv2:SUSE:CVE-2016-5766:6.8:(AV:N/AC:M/Au:N/C:P/I:P/A:P) CVSSv2:RedHat:CVE-2016-5766:5.1:(AV:N/AC:H/Au:N/C:P/I:P/A:P) maint:running:62922:moderate | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Attachments: |
bug72339.gd.bz2
xx.php |
Description
Marcus Meissner
2016-06-24 10:00:10 UTC
Note that you maybe should start to write also php7 as we are going to maintain it in 12sp2 and there is no room for version update anymore - Leonardo push it into QA. Created attachment 682013 [details] bug72339.gd.bz2 QA REPRODUCER: download this file, bunzip2 bug72339.gd.bz2 ... continue in next comment ... Created attachment 682014 [details]
xx.php
QA REPRODUCER:
php xx.php
will crash with the supplied gd file.
hmm yes. you can still push a minor version update for php7 currently, as QA has not started testing it yet. bugbot adjusting priority Segfaults for 12sp2/php7 down to 11/php5. Packages submitted. This is an autogenerated message for OBS integration: This bug (986386) was mentioned in https://build.opensuse.org/request/show/405425 13.2 / php5 This is an autogenerated message for OBS integration: This bug (986386) was mentioned in https://build.opensuse.org/request/show/405458 13.2 / php5 openSUSE-SU-2016:1761-1: An update that fixes 9 vulnerabilities is now available. Category: security (important) Bug References: 986004,986244,986246,986247,986386,986388,986391,986392,986393 CVE References: CVE-2015-8935,CVE-2016-5766,CVE-2016-5767,CVE-2016-5768,CVE-2016-5769,CVE-2016-5770,CVE-2016-5771,CVE-2016-5772,CVE-2016-5773 Sources used: openSUSE 13.2 (src): php5-5.6.1-69.1 SUSE-SU-2016:1842-1: An update that fixes 9 vulnerabilities is now available. Category: security (moderate) Bug References: 986004,986244,986246,986386,986388,986391,986392,986393,988486 CVE References: CVE-2015-8935,CVE-2016-5385,CVE-2016-5766,CVE-2016-5767,CVE-2016-5768,CVE-2016-5769,CVE-2016-5770,CVE-2016-5771,CVE-2016-5772 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): php5-5.5.14-68.1 SUSE Linux Enterprise Module for Web Scripting 12 (src): php5-5.5.14-68.1 openSUSE-SU-2016:1922-1: An update that fixes 9 vulnerabilities is now available. Category: security (moderate) Bug References: 986004,986244,986246,986386,986388,986391,986392,986393,988486 CVE References: CVE-2015-8935,CVE-2016-5385,CVE-2016-5766,CVE-2016-5767,CVE-2016-5768,CVE-2016-5769,CVE-2016-5770,CVE-2016-5771,CVE-2016-5772 Sources used: openSUSE Leap 42.1 (src): php5-5.5.14-56.1 SUSE-SU-2016:2013-1: An update that fixes 5 vulnerabilities is now available. Category: security (important) Bug References: 986004,986244,986386,986388,986393 CVE References: CVE-2015-8935,CVE-2016-5766,CVE-2016-5767,CVE-2016-5769,CVE-2016-5772 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): php53-5.3.17-74.1 SUSE Linux Enterprise Server 11-SP4 (src): php53-5.3.17-74.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): php53-5.3.17-74.1 CVSSv2:SUSE:CVE-2016-5766:6.8:(AV:N/AC:M/Au:N/C:P/I:P/A:P) SUSE-SU-2016:2080-1: An update that fixes 12 vulnerabilities is now available. Category: security (important) Bug References: 986004,986244,986386,986388,986393,991426,991427,991428,991429,991430,991433,991437 CVE References: CVE-2015-8935,CVE-2016-5399,CVE-2016-5766,CVE-2016-5767,CVE-2016-5769,CVE-2016-5772,CVE-2016-6288,CVE-2016-6289,CVE-2016-6290,CVE-2016-6291,CVE-2016-6296,CVE-2016-6297 Sources used: SUSE Linux Enterprise Server 11-SP2-LTSS (src): php5-5.2.14-0.7.30.89.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): php5-5.2.14-0.7.30.89.1 http://git.php.net/?p=php-src.git;a=commit;h=5f107ab8a66f8b36ac0c0b32e0231bf94e083c94 This is also needed to not use unitialized variable. Packages submitted for: 12/php7, 12/php5, 11sp3/php53, 11/php5 and 10sp3/php5. SUSE-SU-2017:2303-1: An update that solves 9 vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 1047454,1048094,1048096,1048100,1048111,1048112,1050241,1050726,1052389,1053645,986386 CVE References: CVE-2016-10397,CVE-2016-5766,CVE-2017-11142,CVE-2017-11144,CVE-2017-11145,CVE-2017-11146,CVE-2017-11147,CVE-2017-11628,CVE-2017-7890 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP3 (src): php7-7.0.7-50.9.2 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php7-7.0.7-50.9.2 SUSE Linux Enterprise Module for Web Scripting 12 (src): php7-7.0.7-50.9.2 SUSE-SU-2017:2317-1: An update that fixes 9 vulnerabilities is now available. Category: security (moderate) Bug References: 1047454,1048094,1048096,1048097,1048111,1048112,1050241,1050726,986386 CVE References: CVE-2016-10397,CVE-2016-5766,CVE-2017-11143,CVE-2017-11144,CVE-2017-11145,CVE-2017-11146,CVE-2017-11147,CVE-2017-11628,CVE-2017-7890 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP3 (src): php5-5.5.14-109.5.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php5-5.5.14-109.5.1 SUSE Linux Enterprise Module for Web Scripting 12 (src): php5-5.5.14-109.5.1 openSUSE-SU-2017:2337-1: An update that solves 9 vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 1047454,1048094,1048096,1048100,1048111,1048112,1050241,1050726,1052389,1053645,986386 CVE References: CVE-2016-10397,CVE-2016-5766,CVE-2017-11142,CVE-2017-11144,CVE-2017-11145,CVE-2017-11146,CVE-2017-11147,CVE-2017-11628,CVE-2017-7890 Sources used: openSUSE Leap 42.3 (src): php7-7.0.7-19.1 openSUSE Leap 42.2 (src): php7-7.0.7-14.9.1 openSUSE-SU-2017:2366-1: An update that fixes 9 vulnerabilities is now available. Category: security (moderate) Bug References: 1047454,1048094,1048096,1048097,1048111,1048112,1050241,1050726,986386 CVE References: CVE-2016-10397,CVE-2016-5766,CVE-2017-11143,CVE-2017-11144,CVE-2017-11145,CVE-2017-11146,CVE-2017-11147,CVE-2017-11628,CVE-2017-7890 Sources used: openSUSE Leap 42.3 (src): php5-5.5.14-82.1 openSUSE Leap 42.2 (src): php5-5.5.14-77.9.1 SUSE-SU-2017:2522-1: An update that fixes 10 vulnerabilities is now available. Category: security (moderate) Bug References: 1047454,1048094,1048096,1048111,1048112,1050241,1050726,1054430,986386 CVE References: CVE-2016-10168,CVE-2016-10397,CVE-2016-5766,CVE-2017-11144,CVE-2017-11145,CVE-2017-11146,CVE-2017-11147,CVE-2017-11628,CVE-2017-12933,CVE-2017-7890 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): php53-5.3.17-112.5.1 SUSE Linux Enterprise Server 11-SP4 (src): php53-5.3.17-112.5.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): php53-5.3.17-112.5.1 released |