SUSE-SU-2017:0534-1: important: Security update for php7

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Feb 22 07:08:22 MST 2017


   SUSE Security Update: Security update for php7
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:0534-1
Rating:             important
References:         #1008026 #1019547 #1019550 #1019568 #1019570 
                    #1022219 #1022255 #1022257 #1022260 #1022262 
                    #1022263 #1022264 #1022265 
Cross-References:   CVE-2016-10158 CVE-2016-10159 CVE-2016-10160
                    CVE-2016-10161 CVE-2016-10162 CVE-2016-10166
                    CVE-2016-10167 CVE-2016-10168 CVE-2016-7478
                    CVE-2016-7479 CVE-2016-7480 CVE-2016-9138
                    CVE-2017-5340
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________

   An update that fixes 13 vulnerabilities is now available.

Description:


   This update for php7 fixes the following security issues:

   - CVE-2016-7480: The SplObjectStorage unserialize implementation in
     ext/spl/spl_observer.c in PHP did not verify that a key is an object,
     which allowed remote attackers to execute arbitrary code or cause a
     denial
     of service (uninitialized memory access) via crafted serialized data.
      (bsc#1019568)
   - CVE-2017-5340: Zend/zend_hash.c in PHP mishandled certain cases that
     require large array allocations, which allowed remote attackers to
     execute arbitrary code or cause a denial of service (integer overflow,
     uninitialized memory access, and use of arbitrary destructor function
     pointers) via crafted serialized data. (bsc#1019570)
   - CVE-2016-7479: In all versions of PHP 7, during the unserialization
     process, resizing the 'properties' hash table of a serialized object may
     have lead to use-after-free. A remote attacker may exploit this bug to
     gain arbitrary code execution. (bsc#1019547)
   - CVE-2016-7478: Zend/zend_exceptions.c in PHP allowed remote attackers to
     cause a denial of service (infinite loop) via a crafted Exception object
     in serialized data, a related issue to CVE-2015-8876.  (bsc#1019550)
   - CVE-2016-10159: Integer overflow in the phar_parse_pharfile function in
     ext/phar/phar.c in PHP allowed remote attackers to cause a denial
     of service (memory consumption or application crash) via a truncated
      manifest entry in a PHAR archive. (bsc#1022255)
   - CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function in
     ext/phar/phar.c in PHP allowed remote attackers to cause a denial
     of service (memory corruption) or possibly execute arbitrary code via a
      crafted PHAR archive with an alias mismatch. (bsc#1022257)
   - CVE-2016-10161: The object_common1 function in
     ext/standard/var_unserializer.c in PHP allowed remote attackers to cause
     a denial of service (buffer over-read and application crash) via crafted
     serialized data that is mishandled in a finish_nested_data call.
     (bsc#1022260)
   - CVE-2016-10162: The php_wddx_pop_element function in ext/wddx/wddx.c in
     PHP 7 allowed remote attackers to cause a denial of service (NULL
     pointer dereference and application crash) via an inapplicable class
     name in a wddxPacket XML document, leading to mishandling in a
     wddx_deserialize call. (bsc#1022262)
   - CVE-2016-10166: A potential unsigned underflow in gd interpolation
     functions could lead to memory corruption in the PHP gd module
     (bsc#1022263)
   - CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
     could lead to php out of memory even on small files. (bsc#1022264)
   - CVE-2016-10168: A signed integer overflow in the gd module could lead to
     memory corruption (bsc#1022265)
   - CVE-2016-9138: PHP mishandled property modification during __wakeup
     processing, which allows remote attackers to cause a denial of service
     or possibly have unspecified other impact via crafted serialized data,
     as demonstrated by Exception::__toString with DateInterval::__wakeup.
     (bsc#1008026)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-277=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-277=1

   - SUSE Linux Enterprise Module for Web Scripting 12:

      zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2017-277=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      php7-debuginfo-7.0.7-35.1
      php7-debugsource-7.0.7-35.1
      php7-devel-7.0.7-35.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      php7-debuginfo-7.0.7-35.1
      php7-debugsource-7.0.7-35.1
      php7-devel-7.0.7-35.1

   - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64):

      apache2-mod_php7-7.0.7-35.1
      apache2-mod_php7-debuginfo-7.0.7-35.1
      php7-7.0.7-35.1
      php7-bcmath-7.0.7-35.1
      php7-bcmath-debuginfo-7.0.7-35.1
      php7-bz2-7.0.7-35.1
      php7-bz2-debuginfo-7.0.7-35.1
      php7-calendar-7.0.7-35.1
      php7-calendar-debuginfo-7.0.7-35.1
      php7-ctype-7.0.7-35.1
      php7-ctype-debuginfo-7.0.7-35.1
      php7-curl-7.0.7-35.1
      php7-curl-debuginfo-7.0.7-35.1
      php7-dba-7.0.7-35.1
      php7-dba-debuginfo-7.0.7-35.1
      php7-debuginfo-7.0.7-35.1
      php7-debugsource-7.0.7-35.1
      php7-dom-7.0.7-35.1
      php7-dom-debuginfo-7.0.7-35.1
      php7-enchant-7.0.7-35.1
      php7-enchant-debuginfo-7.0.7-35.1
      php7-exif-7.0.7-35.1
      php7-exif-debuginfo-7.0.7-35.1
      php7-fastcgi-7.0.7-35.1
      php7-fastcgi-debuginfo-7.0.7-35.1
      php7-fileinfo-7.0.7-35.1
      php7-fileinfo-debuginfo-7.0.7-35.1
      php7-fpm-7.0.7-35.1
      php7-fpm-debuginfo-7.0.7-35.1
      php7-ftp-7.0.7-35.1
      php7-ftp-debuginfo-7.0.7-35.1
      php7-gd-7.0.7-35.1
      php7-gd-debuginfo-7.0.7-35.1
      php7-gettext-7.0.7-35.1
      php7-gettext-debuginfo-7.0.7-35.1
      php7-gmp-7.0.7-35.1
      php7-gmp-debuginfo-7.0.7-35.1
      php7-iconv-7.0.7-35.1
      php7-iconv-debuginfo-7.0.7-35.1
      php7-imap-7.0.7-35.1
      php7-imap-debuginfo-7.0.7-35.1
      php7-intl-7.0.7-35.1
      php7-intl-debuginfo-7.0.7-35.1
      php7-json-7.0.7-35.1
      php7-json-debuginfo-7.0.7-35.1
      php7-ldap-7.0.7-35.1
      php7-ldap-debuginfo-7.0.7-35.1
      php7-mbstring-7.0.7-35.1
      php7-mbstring-debuginfo-7.0.7-35.1
      php7-mcrypt-7.0.7-35.1
      php7-mcrypt-debuginfo-7.0.7-35.1
      php7-mysql-7.0.7-35.1
      php7-mysql-debuginfo-7.0.7-35.1
      php7-odbc-7.0.7-35.1
      php7-odbc-debuginfo-7.0.7-35.1
      php7-opcache-7.0.7-35.1
      php7-opcache-debuginfo-7.0.7-35.1
      php7-openssl-7.0.7-35.1
      php7-openssl-debuginfo-7.0.7-35.1
      php7-pcntl-7.0.7-35.1
      php7-pcntl-debuginfo-7.0.7-35.1
      php7-pdo-7.0.7-35.1
      php7-pdo-debuginfo-7.0.7-35.1
      php7-pgsql-7.0.7-35.1
      php7-pgsql-debuginfo-7.0.7-35.1
      php7-phar-7.0.7-35.1
      php7-phar-debuginfo-7.0.7-35.1
      php7-posix-7.0.7-35.1
      php7-posix-debuginfo-7.0.7-35.1
      php7-pspell-7.0.7-35.1
      php7-pspell-debuginfo-7.0.7-35.1
      php7-shmop-7.0.7-35.1
      php7-shmop-debuginfo-7.0.7-35.1
      php7-snmp-7.0.7-35.1
      php7-snmp-debuginfo-7.0.7-35.1
      php7-soap-7.0.7-35.1
      php7-soap-debuginfo-7.0.7-35.1
      php7-sockets-7.0.7-35.1
      php7-sockets-debuginfo-7.0.7-35.1
      php7-sqlite-7.0.7-35.1
      php7-sqlite-debuginfo-7.0.7-35.1
      php7-sysvmsg-7.0.7-35.1
      php7-sysvmsg-debuginfo-7.0.7-35.1
      php7-sysvsem-7.0.7-35.1
      php7-sysvsem-debuginfo-7.0.7-35.1
      php7-sysvshm-7.0.7-35.1
      php7-sysvshm-debuginfo-7.0.7-35.1
      php7-tokenizer-7.0.7-35.1
      php7-tokenizer-debuginfo-7.0.7-35.1
      php7-wddx-7.0.7-35.1
      php7-wddx-debuginfo-7.0.7-35.1
      php7-xmlreader-7.0.7-35.1
      php7-xmlreader-debuginfo-7.0.7-35.1
      php7-xmlrpc-7.0.7-35.1
      php7-xmlrpc-debuginfo-7.0.7-35.1
      php7-xmlwriter-7.0.7-35.1
      php7-xmlwriter-debuginfo-7.0.7-35.1
      php7-xsl-7.0.7-35.1
      php7-xsl-debuginfo-7.0.7-35.1
      php7-zip-7.0.7-35.1
      php7-zip-debuginfo-7.0.7-35.1
      php7-zlib-7.0.7-35.1
      php7-zlib-debuginfo-7.0.7-35.1

   - SUSE Linux Enterprise Module for Web Scripting 12 (noarch):

      php7-pear-7.0.7-35.1
      php7-pear-Archive_Tar-7.0.7-35.1


References:

   https://www.suse.com/security/cve/CVE-2016-10158.html
   https://www.suse.com/security/cve/CVE-2016-10159.html
   https://www.suse.com/security/cve/CVE-2016-10160.html
   https://www.suse.com/security/cve/CVE-2016-10161.html
   https://www.suse.com/security/cve/CVE-2016-10162.html
   https://www.suse.com/security/cve/CVE-2016-10166.html
   https://www.suse.com/security/cve/CVE-2016-10167.html
   https://www.suse.com/security/cve/CVE-2016-10168.html
   https://www.suse.com/security/cve/CVE-2016-7478.html
   https://www.suse.com/security/cve/CVE-2016-7479.html
   https://www.suse.com/security/cve/CVE-2016-7480.html
   https://www.suse.com/security/cve/CVE-2016-9138.html
   https://www.suse.com/security/cve/CVE-2017-5340.html
   https://bugzilla.suse.com/1008026
   https://bugzilla.suse.com/1019547
   https://bugzilla.suse.com/1019550
   https://bugzilla.suse.com/1019568
   https://bugzilla.suse.com/1019570
   https://bugzilla.suse.com/1022219
   https://bugzilla.suse.com/1022255
   https://bugzilla.suse.com/1022257
   https://bugzilla.suse.com/1022260
   https://bugzilla.suse.com/1022262
   https://bugzilla.suse.com/1022263
   https://bugzilla.suse.com/1022264
   https://bugzilla.suse.com/1022265



More information about the sle-security-updates mailing list