Hello community,

here is the log from the commit of package patchinfo.5145 for 
openSUSE:13.2:Update checked in at 2016-06-11 10:07:54
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5145 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.5145.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.5145"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="5145">
  <issue id="981050" tracker="bnc">VUL-0: CVE-2015-8879: php5, php53: The 
odbc_bindcols function in ext/odbc/php_odbc.c mishandles driver behavior for 
SQL_WVARCHAR columns</issue>
  <issue id="980373" tracker="bnc">VUL-0: CVE-2015-8873: php5, php53: Stack 
consumption vulnerability in Zend/zend_exceptions.c</issue>
  <issue id="980366" tracker="bnc">VUL-0: CVE-2015-4116: php5, php53: 
Use-after-free vulnerability in the spl_ptr_heap_insert function</issue>
  <issue id="981049" tracker="bnc">VUL-0: CVE-2015-8876: php5, php53: 
Zend/zend_exceptions.c does not validate certain Exception objects</issue>
  <issue id="981061" tracker="bnc">VUL-0: CVE-2015-8877: php5, php53: The 
gdImageScaleTwoPass function in gd_interpolation.c uses inconsistent allocate 
and free approaches.</issue>
  <issue id="980375" tracker="bnc">VUL-0: CVE-2015-8874: php5, php53: Stack 
consumption vulnerability in GD</issue>
  <issue id="976775" tracker="bnc">VUL-0: CVE-2016-3074: php5,php53: signedness 
vulnerability in bundled libgd library</issue>
  <issue id="982009" tracker="bnc">VUL-0: CVE-2013-7456: php5, php53: 
imagescale out-of-bounds read</issue>
  <issue id="982010" tracker="bnc">VUL-0: CVE-2016-5093: php5, php53: 
get_icu_value_internal out-of-bounds read</issue>
  <issue id="982011" tracker="bnc">VUL-0: CVE-2016-5094: php5, php53: don't 
create strings with lengths outside int range</issue>
  <issue id="982012" tracker="bnc">VUL-0: CVE-2016-5095: php5, php53: don't 
create strings with lengths outside int range</issue>
  <issue id="982013" tracker="bnc">VUL-0: CVE-2016-5096: php5, php53: 
int/size_t confusion in fread</issue>
  <issue id="982162" tracker="bnc">VUL-0: CVE-2016-5114: php5, php53: fpm_log.c 
memory leak and buffer overflow</issue>
  <issue id="CVE-2013-7456" tracker="cve" />
  <issue id="CVE-2016-5093" tracker="cve" />
  <issue id="CVE-2016-5094" tracker="cve" />
  <issue id="CVE-2016-5095" tracker="cve" />
  <issue id="CVE-2016-5096" tracker="cve" />
  <issue id="CVE-2016-5114" tracker="cve" />
  <issue id="CVE-2015-8873" tracker="cve" />
  <issue id="CVE-2015-4116" tracker="cve" />
  <issue id="CVE-2015-8876" tracker="cve" />
  <issue id="CVE-2015-8877" tracker="cve" />
  <issue id="CVE-2015-8874" tracker="cve" />
  <issue id="CVE-2015-8879" tracker="cve" />
  <issue id="CVE-2016-3074" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>pgajdos</packager>
  <description>This update for php5 fixes the following issues: 

- CVE-2013-7456: imagescale out-of-bounds read (bnc#982009).
- CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010).
- CVE-2016-5094: Don't create strings with lengths outside int range 
(bnc#982011).
- CVE-2016-5095: Don't create strings with lengths outside int range 
(bnc#982012).
- CVE-2016-5096: int/size_t confusion in fread (bsc#982013).
- CVE-2016-5114: fpm_log.c memory leak and buffer overflow (bnc#982162).
- CVE-2015-8877: The gdImageScaleTwoPass function in gd_interpolation.c in the 
GD Graphics Library (aka libgd), as used in PHP, used inconsistent allocate and 
free approaches, which allowed remote attackers to cause a denial of service 
(memory consumption) via a crafted call, as demonstrated by a call to the PHP 
imagescale function (bsc#981061).
- CVE-2015-8876: Zend/zend_exceptions.c in PHP did not validate certain 
Exception objects, which allowed remote attackers to cause a denial of service 
(NULL pointer dereference and application crash) or trigger unintended method 
execution via crafted serialized data (bsc#981049).
- CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP 
mishandled driver behavior for SQL_WVARCHAR columns, which allowed remote 
attackers to cause a denial of service (application crash) in opportunistic 
circumstances by leveraging use of the odbc_fetch_array function to access a 
certain type of Microsoft SQL Server table Aliased: (bsc#981050).
- CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert 
function in ext/spl/spl_heap.c in PHP allowed remote attackers to execute 
arbitrary code by triggering a failed SplMinHeap::compare operation 
(bsc#980366).
- CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed remote 
attackers to cause a denial of service via a crafted imagefilltoborder call 
(bsc#980375).
- CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c in 
PHP allowed remote attackers to cause a denial of service (segmentation fault) 
via recursive method calls (bsc#980373).
- CVE-2016-3074: Integer signedness error in GD Graphics Library (aka libgd or 
libgd2) allowed remote attackers to cause a denial of service (crash) or 
potentially execute arbitrary code via crafted compressed gd2 data, which 
triggers a heap-based buffer overflow (bsc#976775).
</description>
  <summary>Security update for php5</summary>
</patchinfo>

Reply via email to