Bug 22358 - [Update Request] php 5.6.33
Summary: [Update Request] php 5.6.33
Status: RESOLVED DUPLICATE of bug 22321
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: Cauldron
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact: Sec team
URL: https://www.debian.org/security/2018/...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-01-09 11:33 CET by Zombie Ryushu
Modified: 2018-01-09 11:35 CET (History)
1 user (show)

See Also:
Source RPM: php
CVE: CVE-2017-11142
Status comment:


Attachments

Description Zombie Ryushu 2018-01-09 11:33:15 CET
Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language:

    CVE-2017-11142

    Denial of service via overly long form variables
    CVE-2017-11143

    Invalid free() in wddx_deserialize()
    CVE-2017-11144

    Denial of service in openssl extension due to incorrect return value check of OpenSSL sealing function.
    CVE-2017-11145

    Out-of-bounds read in wddx_deserialize()
    CVE-2017-11628

    Buffer overflow in PHP INI parsing API
    CVE-2017-12933

    Buffer overread in finish_nested_data()
    CVE-2017-16642

    Out-of-bounds read in timelib_meridian()
Zombie Ryushu 2018-01-09 11:33:40 CET

CVE: (none) => CVE-2017-11142

Comment 1 Thomas Backlund 2018-01-09 11:35:15 CET
already being worked on

*** This bug has been marked as a duplicate of bug 22321 ***

Resolution: (none) => DUPLICATE
Status: NEW => RESOLVED
CC: (none) => tmb


Note You need to log in before you can comment on or make changes to this bug.