[SECURITY] [DLA 533-1] php5 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : php5
Version : 5.4.45-0+deb7u4
CVE ID : CVE-2016-5093 CVE-2016-5094 CVE-2016-5095 CVE-2016-5096
PHP bugs : 70661 70728 70741 70480
* CVE-2016-5093.patch
Absence of null character causes unexpected zend_string length and
leaks heap memory. The test script uses locale_get_primary_language
to reach get_icu_value_internal but there are some other functions
that also trigger this issue:
locale_canonicalize, locale_filter_matches,
locale_lookup, locale_parse
* CVE-2016-5094.patch
don't create strings with lengths outside int range
* CVE-2016-5095.patch
similar to CVE-2016-5094
don't create strings with lengths outside int range
* CVE-2016-5096.patch
int/size_t confusion in fread
* CVE-TEMP-bug-70661.patch
bug70661: Use After Free Vulnerability in WDDX Packet Deserialization
* CVE-TEMP-bug-70728.patch
bug70728: Type Confusion Vulnerability in PHP_to_XMLRPC_worker()
* CVE-TEMP-bug-70741.patch
bug70741: Session WDDX Packet Deserialization Type Confusion
Vulnerability
* CVE-TEMP-bug-70480-raw.patch
bug70480: php_url_parse_ex() buffer overflow read
For Debian 7 "Wheezy", these problems have been fixed in version
5.4.45-0+deb7u4.
We recommend that you upgrade your php5 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=+nBJ
-----END PGP SIGNATURE-----
Reply to: