Bug 22358

Summary: [Update Request] php 5.6.33
Product: Mageia Reporter: Zombie Ryushu <zombie_ryushu>
Component: SecurityAssignee: Mageia Bug Squad <bugsquad>
Status: RESOLVED DUPLICATE QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: tmb
Version: Cauldron   
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: https://www.debian.org/security/2018/dsa-4081
Whiteboard:
Source RPM: php CVE: CVE-2017-11142
Status comment:

Description Zombie Ryushu 2018-01-09 11:33:15 CET
Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language:

    CVE-2017-11142

    Denial of service via overly long form variables
    CVE-2017-11143

    Invalid free() in wddx_deserialize()
    CVE-2017-11144

    Denial of service in openssl extension due to incorrect return value check of OpenSSL sealing function.
    CVE-2017-11145

    Out-of-bounds read in wddx_deserialize()
    CVE-2017-11628

    Buffer overflow in PHP INI parsing API
    CVE-2017-12933

    Buffer overread in finish_nested_data()
    CVE-2017-16642

    Out-of-bounds read in timelib_meridian()
Zombie Ryushu 2018-01-09 11:33:40 CET

CVE: (none) => CVE-2017-11142

Comment 1 Thomas Backlund 2018-01-09 11:35:15 CET
already being worked on

*** This bug has been marked as a duplicate of bug 22321 ***

Resolution: (none) => DUPLICATE
Status: NEW => RESOLVED
CC: (none) => tmb