File _patchinfo of Package patchinfo.4503

<patchinfo incident="4503">
  <issue id="1040883" tracker="bnc">VUL-0: CVE-2017-9227: php5,php7,ruby,php53:  stack out-of-bounds read in mbc_enc_len() during regular expression searching</issue>
  <issue id="1040889" tracker="bnc">VUL-0: CVE-2017-9226: php5,php7,ruby,php53: heap out-of-bounds write orread occurs in next_state_val() during regular expression compilation</issue>
  <issue id="1040891" tracker="bnc">VUL-0: CVE-2017-9224: php5,php7,ruby,php53: stack out-of-bounds read occurs in match_at() during regular expression searching</issue>
  <issue id="1035111" tracker="bnc">VUL-1: CVE-2016-6294: php5,php53,php7: workaround for icu: locale_accept_from_http out-of-bounds access</issue>
  <issue id="2017-9224" tracker="cve" />
  <issue id="2017-9227" tracker="cve" />
  <issue id="2016-6294" tracker="cve" />
  <issue id="2017-9226" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>pgajdos</packager>
  <description>This update for php5 fixes the following security issues:

- CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111).
- CVE-2017-9227: A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. (bsc#1040883)
- CVE-2017-9226: A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. (bsc#1040889)
- CVE-2017-9224: A stack out-of-bounds read occurs in match_at() during regular expression searching. (bsc#1040891)

</description>
  <summary>Security update for php5</summary>
</patchinfo>
openSUSE Build Service is sponsored by