Commit: b9da4107f54662e850c9155ccdca20adecf2b441 Author: Lior Kaplan <[email protected]> Thu, 1 Sep 2016 17:38:09 +0300 Parents: 43ebae80cf1500f22d6d9e3aecaa0aa2e0231d70 Branches: master
Link: http://git.php.net/?p=web/php.git;a=commitdiff;h=b9da4107f54662e850c9155ccdca20adecf2b441 Log: Add CVE IDs for PHP 5.5.38 and 5.6.24 Changed paths: M ChangeLog-5.php Diff: diff --git a/ChangeLog-5.php b/ChangeLog-5.php index 455c415..c299557 100644 --- a/ChangeLog-5.php +++ b/ChangeLog-5.php @@ -141,20 +141,20 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", "css" => array("change <li><?php bugfix(71936); ?> (Segmentation fault destroying HTTP_RAW_POST_DATA).</li> <li><?php bugfix(72496); ?> (Cannot declare public method with signature incompatible with parent private method).</li> <li><?php bugfix(72138); ?> (Integer Overflow in Length of String-typed ZVAL).</li> - <li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in virtual_file_ex).</li> - <li><?php bugfix(72562); ?> (Use After Free in unserialize() with Unexpected Session Deserialization).</li> - <li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP libraries and applications).</li> + <li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in virtual_file_ex). (CVE-2016-6289)</li> + <li><?php bugfix(72562); ?> (Use After Free in unserialize() with Unexpected Session Deserialization). (CVE-2016-6290)</li> + <li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP libraries and applications). (CVE-2016-5385)</li> </ul></li> <li>bz2: <ul> - <li><?php bugfix(72447); ?> (Type Confusion in php_bz2_filter_create()). (gogil at stealien dot com).</li> - <li><?php bugfix(72613); ?> (Inadequate error handling in bzread()).</li> + <li><?php bugfix(72447); ?> (Type Confusion in php_bz2_filter_create()).</li> + <li><?php bugfix(72613); ?> (Inadequate error handling in bzread()). (CVE-2016-5399)</li> </ul></li> <li>EXIF: <ul> <li><?php bugfix(50845); ?> (exif_read_data() returns corrupted exif headers).</li> - <li><?php bugfix(72603); ?> (Out of bound read in exif_process_IFD_in_MAKERNOTE).</li> - <li><?php bugfix(72618); ?> (NULL Pointer Dereference in exif_process_user_comment).</li> + <li><?php bugfix(72603); ?> (Out of bound read in exif_process_IFD_in_MAKERNOTE). (CVE-2016-6291)</li> + <li><?php bugfix(72618); ?> (NULL Pointer Dereference in exif_process_user_comment). (CVE-2016-6292)</li> </ul></li> <li>GD: <ul> @@ -163,15 +163,15 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", "css" => array("change <li><?php bugfix(64641); ?> (imagefilledpolygon doesn't draw horizontal line).</li> <li><?php bugfix(72512); ?> (gdImageTrueColorToPaletteBody allows arbitrary write/read access).</li> <li><?php bugfix(72519); ?> (imagegif/output out-of-bounds access).</li> - <li><?php bugfix(72558); ?> (Integer overflow error within _gdContributionsAlloc()).</li> + <li><?php bugfix(72558); ?> (Integer overflow error within _gdContributionsAlloc()). (CVE-2016-6207)</li> </ul></li> <li>Intl: <ul> - <li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds access).</li> + <li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds access). (CVE-2016-6294)</li> </ul></li> <li>ODBC: <ul> - <li><?php bugfix(69975); ?> (PHP segfaults when accessing nvarchar(max) defined columns)</li> + <li><?php bugfix(69975); ?> (PHP segfaults when accessing nvarchar(max) defined columns). (CVE-2015-8879)</li> </ul></li> <li>OpenSSL: <ul> @@ -180,7 +180,7 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", "css" => array("change </ul></li> <li>SNMP: <ul> - <li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC and unserialize()).</li> + <li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC and unserialize()). (CVE-2016-6295)</li> </ul></li> <li>SPL: <ul> @@ -196,11 +196,11 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", "css" => array("change </ul></li> <li>Xmlrpc: <ul> - <li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn simplestring.c).</li> + <li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn simplestring.c). (CVE-2016-6296)</li> </ul></li> <li>Zip: <ul> - <li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in php_stream_zip_opener).</li> + <li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in php_stream_zip_opener). (CVE-2016-6297)</li> </ul></li> </ul> <!-- }}} --></section> @@ -210,45 +210,45 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", "css" => array("change <b><?php release_date('21-Jul-2016'); ?></b> <ul><li>BZip2: <ul> - <li><?php bugfix(72613); ?> (Inadequate error handling in bzread()).</li> + <li><?php bugfix(72613); ?> (Inadequate error handling in bzread()). (CVE-2016-5399)</li> </ul></li> <li>Core: <ul> - <li><?php bugfix(70480); ?> (php_url_parse_ex() buffer overflow read).</li> - <li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in virtual_file_ex).</li> - <li><?php bugfix(72562); ?> (Use After Free in unserialize() with Unexpected Session Deserialization).</li> - <li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP libraries and applications).</li> + <li><?php bugfix(70480); ?> (php_url_parse_ex() buffer overflow read). (CVE-2016-6288)</li> + <li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in virtual_file_ex). (CVE-2016-6289)</li> + <li><?php bugfix(72562); ?> (Use After Free in unserialize() with Unexpected Session Deserialization). (CVE-2016-6290)</li> + <li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP libraries and applications). (CVE-2016-5385)</li> </ul></li> <li>EXIF: <ul> - <li><?php bugfix(72603); ?> (Out of bound read in exif_process_IFD_in_MAKERNOTE).</li> - <li><?php bugfix(72618); ?> (NULL Pointer Dereference in exif_process_user_comment).</li> + <li><?php bugfix(72603); ?> (Out of bound read in exif_process_IFD_in_MAKERNOTE). (CVE-2016-6291)</li> + <li><?php bugfix(72618); ?> (NULL Pointer Dereference in exif_process_user_comment). (CVE-2016-6292)</li> </ul></li> <li>GD: <ul> <li><?php bugfix(72512); ?> (gdImageTrueColorToPaletteBody allows arbitrary write/read access).</li> <li><?php bugfix(72519); ?> (imagegif/output out-of-bounds access).</li> - <li><?php bugfix(72558); ?> (Integer overflow error within _gdContributionsAlloc()).</li> + <li><?php bugfix(72558); ?> (Integer overflow error within _gdContributionsAlloc()). (CVE-2016-6207)</li> </ul></li> <li>Intl: <ul> - <li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds access).</li> + <li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds access). (CVE-2016-6294)</li> </ul></li> <li>ODBC: <ul> - <li><?php bugfix(69975); ?> (PHP segfaults when accessing nvarchar(max) defined columns)</li> + <li><?php bugfix(69975); ?> (PHP segfaults when accessing nvarchar(max) defined columns). (CVE-2015-8879)</li> </ul></li> <li>SNMP: <ul> - <li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC and unserialize()).</li> + <li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC and unserialize()). (CVE-2016-6295)</li> </ul></li> <li>Xmlrpc: <ul> - <li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn simplestring.c).</li> + <li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn simplestring.c). (CVE-2016-6296)</li> </ul></li> <li>Zip: <ul> - <li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in php_stream_zip_opener).</li> + <li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in php_stream_zip_opener). (CVE-2016-6297)</li> </ul></li> </ul> <!-- }}} --></section> -- PHP Webmaster List Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php
