SUSE-SU-2017:2522-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:2522-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:2522-1
Related
Published
2017-09-18T10:31:12Z
Modified
2017-09-18T10:31:12Z
Summary
Security update for php53
Details

This update for php53 fixes the several issues.

These security issues were fixed:

  • CVE-2017-12933: The finishnesteddata function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
  • CVE-2017-11628: Stack-based buffer overflow in the zendinidoop() function in Zend/zendini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
  • CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
  • CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
  • CVE-2017-11145: An error in the date extension's timelibmeridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parsedate.c out-of-bounds reads affecting the phpparsedate function (bsc#1048112).
  • CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
  • CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
  • CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the pharparsepharfile function (bsc#1048094).
  • CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).
References

Affected packages

SUSE:Linux Enterprise Software Development Kit 11 SP4 / php53

Package

Name
php53
Purl
purl:rpm/suse/php53&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.17-112.5.1

Ecosystem specific

{
    "binaries": [
        {
            "php53-devel": "5.3.17-112.5.1",
            "php53-readline": "5.3.17-112.5.1",
            "php53-posix": "5.3.17-112.5.1",
            "php53-sockets": "5.3.17-112.5.1",
            "php53-imap": "5.3.17-112.5.1",
            "php53-sqlite": "5.3.17-112.5.1",
            "php53-tidy": "5.3.17-112.5.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / php53

Package

Name
php53
Purl
purl:rpm/suse/php53&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.17-112.5.1

Ecosystem specific

{
    "binaries": [
        {
            "php53-ldap": "5.3.17-112.5.1",
            "php53-gd": "5.3.17-112.5.1",
            "php53-sysvmsg": "5.3.17-112.5.1",
            "php53-soap": "5.3.17-112.5.1",
            "php53-zip": "5.3.17-112.5.1",
            "php53-curl": "5.3.17-112.5.1",
            "php53-suhosin": "5.3.17-112.5.1",
            "php53-mysql": "5.3.17-112.5.1",
            "php53-pear": "5.3.17-112.5.1",
            "php53-iconv": "5.3.17-112.5.1",
            "php53-json": "5.3.17-112.5.1",
            "php53-odbc": "5.3.17-112.5.1",
            "php53-sysvsem": "5.3.17-112.5.1",
            "php53-xmlrpc": "5.3.17-112.5.1",
            "php53-openssl": "5.3.17-112.5.1",
            "php53-xmlreader": "5.3.17-112.5.1",
            "php53-dba": "5.3.17-112.5.1",
            "php53-xsl": "5.3.17-112.5.1",
            "php53-sysvshm": "5.3.17-112.5.1",
            "php53-dom": "5.3.17-112.5.1",
            "php53-pcntl": "5.3.17-112.5.1",
            "php53-mbstring": "5.3.17-112.5.1",
            "php53-pspell": "5.3.17-112.5.1",
            "php53-intl": "5.3.17-112.5.1",
            "php53-fileinfo": "5.3.17-112.5.1",
            "php53-pdo": "5.3.17-112.5.1",
            "php53-ctype": "5.3.17-112.5.1",
            "php53-shmop": "5.3.17-112.5.1",
            "php53-exif": "5.3.17-112.5.1",
            "php53-gettext": "5.3.17-112.5.1",
            "php53-calendar": "5.3.17-112.5.1",
            "php53-xmlwriter": "5.3.17-112.5.1",
            "php53-zlib": "5.3.17-112.5.1",
            "php53-ftp": "5.3.17-112.5.1",
            "php53-tokenizer": "5.3.17-112.5.1",
            "php53-bcmath": "5.3.17-112.5.1",
            "php53-pgsql": "5.3.17-112.5.1",
            "apache2-mod_php53": "5.3.17-112.5.1",
            "php53-fastcgi": "5.3.17-112.5.1",
            "php53-mcrypt": "5.3.17-112.5.1",
            "php53-snmp": "5.3.17-112.5.1",
            "php53-wddx": "5.3.17-112.5.1",
            "php53-gmp": "5.3.17-112.5.1",
            "php53": "5.3.17-112.5.1",
            "php53-bz2": "5.3.17-112.5.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / php53

Package

Name
php53
Purl
purl:rpm/suse/php53&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.17-112.5.1

Ecosystem specific

{
    "binaries": [
        {
            "php53-ldap": "5.3.17-112.5.1",
            "php53-gd": "5.3.17-112.5.1",
            "php53-sysvmsg": "5.3.17-112.5.1",
            "php53-soap": "5.3.17-112.5.1",
            "php53-zip": "5.3.17-112.5.1",
            "php53-curl": "5.3.17-112.5.1",
            "php53-suhosin": "5.3.17-112.5.1",
            "php53-mysql": "5.3.17-112.5.1",
            "php53-pear": "5.3.17-112.5.1",
            "php53-iconv": "5.3.17-112.5.1",
            "php53-json": "5.3.17-112.5.1",
            "php53-odbc": "5.3.17-112.5.1",
            "php53-sysvsem": "5.3.17-112.5.1",
            "php53-xmlrpc": "5.3.17-112.5.1",
            "php53-openssl": "5.3.17-112.5.1",
            "php53-xmlreader": "5.3.17-112.5.1",
            "php53-dba": "5.3.17-112.5.1",
            "php53-xsl": "5.3.17-112.5.1",
            "php53-sysvshm": "5.3.17-112.5.1",
            "php53-dom": "5.3.17-112.5.1",
            "php53-pcntl": "5.3.17-112.5.1",
            "php53-mbstring": "5.3.17-112.5.1",
            "php53-pspell": "5.3.17-112.5.1",
            "php53-intl": "5.3.17-112.5.1",
            "php53-fileinfo": "5.3.17-112.5.1",
            "php53-pdo": "5.3.17-112.5.1",
            "php53-ctype": "5.3.17-112.5.1",
            "php53-shmop": "5.3.17-112.5.1",
            "php53-exif": "5.3.17-112.5.1",
            "php53-gettext": "5.3.17-112.5.1",
            "php53-calendar": "5.3.17-112.5.1",
            "php53-xmlwriter": "5.3.17-112.5.1",
            "php53-zlib": "5.3.17-112.5.1",
            "php53-ftp": "5.3.17-112.5.1",
            "php53-tokenizer": "5.3.17-112.5.1",
            "php53-bcmath": "5.3.17-112.5.1",
            "php53-pgsql": "5.3.17-112.5.1",
            "apache2-mod_php53": "5.3.17-112.5.1",
            "php53-fastcgi": "5.3.17-112.5.1",
            "php53-mcrypt": "5.3.17-112.5.1",
            "php53-snmp": "5.3.17-112.5.1",
            "php53-wddx": "5.3.17-112.5.1",
            "php53-gmp": "5.3.17-112.5.1",
            "php53": "5.3.17-112.5.1",
            "php53-bz2": "5.3.17-112.5.1"
        }
    ]
}