Bugzilla – Bug 1015189
VUL-0: CVE-2016-9935: php5,php53,php7: Invalid read when wddx decodes empty boolean element
Last modified: 2017-09-20 06:35:49 UTC
Reference: http://seclists.org/oss-sec/2016/q4/658 =================================================== Fixed in PHP 5.6.29 and 7.0.14: Bug #73631 Invalid read when wddx decodes empty boolean element https://bugs.php.net/bug.php?id=73631 https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 Use CVE-2016-9935. ===================================================
bugbot adjusting priority
Created attachment 706293 [details] CVE-2016-9935.php QA REPRODUCER: php CVE-2016-9935.php should not segfault.
php53 also crashes, assmunuing all affected.
Yes, crashes from php7 to 10sp3/php5.
All affected down to 11/php5. AFTER $ php test.php float(2261634.5098039) $
Packages submitted.
This is an autogenerated message for OBS integration: This bug (1015189) was mentioned in https://build.opensuse.org/request/show/445958 13.2 / php5
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-01-02. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63304
openSUSE-SU-2016:3239-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1015187,1015188,1015189 CVE References: CVE-2016-9933,CVE-2016-9934,CVE-2016-9935 Sources used: openSUSE 13.2 (src): php5-5.6.1-89.1
SUSE-SU-2017:0017-1: An update that fixes four vulnerabilities is now available. Category: security (moderate) Bug References: 1015187,1015188,1015189,1015191 CVE References: CVE-2016-9933,CVE-2016-9934,CVE-2016-9935,CVE-2016-9936 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php7-7.0.7-28.2 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): php7-7.0.7-28.2 SUSE Linux Enterprise Module for Web Scripting 12 (src): php7-7.0.7-28.2
SUSE-SU-2017:0038-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1015187,1015188,1015189 CVE References: CVE-2016-9933,CVE-2016-9934,CVE-2016-9935 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): php5-5.5.14-89.2 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): php5-5.5.14-89.2 SUSE Linux Enterprise Module for Web Scripting 12 (src): php5-5.5.14-89.2
openSUSE-SU-2017:0081-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1015187,1015188,1015189 CVE References: CVE-2016-9933,CVE-2016-9934,CVE-2016-9935 Sources used: openSUSE Leap 42.2 (src): php5-5.5.14-72.1 openSUSE Leap 42.1 (src): php5-5.5.14-71.1
SUSE-SU-2017:0109-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1012232,1015187,1015188,1015189,974305 CVE References: CVE-2014-9912,CVE-2016-9933,CVE-2016-9934,CVE-2016-9935 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): php53-5.3.17-94.1 SUSE Linux Enterprise Server 11-SP4 (src): php53-5.3.17-94.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): php53-5.3.17-94.1
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2017-02-13. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63367
openSUSE-SU-2017:0598-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 1015187,1015188,1015189 CVE References: CVE-2016-9933,CVE-2016-9934,CVE-2016-9935 Sources used: openSUSE Leap 42.2 (src): php5-5.5.14-75.2 openSUSE Leap 42.1 (src): php5-5.5.14-75.1
released