File _patchinfo of Package patchinfo.4025

<patchinfo incident="4025">
  <issue id="1019570" tracker="bnc">VUL-1: CVE-2017-5340: php7: use of uninitialized memory in unserialize() related to large array allocations</issue>
  <issue id="1019550" tracker="bnc">VUL-1: CVE-2016-7478: php: Unserialize Exception object can lead to infinite loop</issue>
  <issue id="1019568" tracker="bnc">VUL-0: CVE-2016-7480: php: specially crafted serialized data may trigger uninitialized memory access</issue>
  <issue id="1019547" tracker="bnc">VUL-1: CVE-2016-7479: php7: use-after-free during unserialization when resizing the 'properties' hash table of a serialized object</issue>
  <issue id="1022219" tracker="bnc">VUL-1: CVE-2016-10158: php: ext/exif/exif.c :: exif_convert_any_to_int DoS via crafted EXIF data</issue>
  <issue id="1022255" tracker="bnc">VUL-0: CVE-2016-10159: php: ext/phar/phar.c :: phar_parse_pharfile integer overflow DoS</issue>
  <issue id="1022257" tracker="bnc">VUL-0: CVE-2016-10160: php: ext/phar/phar.c :: phar_parse_pharfile off-by-one error via crafted PHAR archives with an alias mismatch</issue>
  <issue id="1022260" tracker="bnc">VUL-1: CVE-2016-10161: php: ext/standard/var_unserializer.c :: object_common1 DoS via crafted serialized data</issue>
  <issue id="1022262" tracker="bnc">VUL-0: CVE-2016-10162: php7: ext/wddx/wddx.c :: php_wddx_pop_element</issue>
  <issue id="1022263" tracker="bnc">VUL-1: CVE-2016-10166: gd,php5,php53,php7: potential unsigned underflow</issue>
  <issue id="1022264" tracker="bnc">VUL-1: CVE-2016-10167: gd,php5,php53,php7: DOS vulnerability in gdImageCreateFromGd2Ctx()</issue>
  <issue id="1022265" tracker="bnc">VUL-0: CVE-2016-10168: gd,php5,php53,php7: Signed Integer Overflow gd_io.c</issue>
  <issue id="1008026" tracker="bnc">VUL-1: CVE-2016-9138: php: Use After Free in unserialize()</issue>
  <issue id="2016-10158" tracker="cve" />
  <issue id="2016-10159" tracker="cve" />
  <issue id="2016-10160" tracker="cve" />
  <issue id="2016-10161" tracker="cve" />
  <issue id="2016-10162" tracker="cve" />
  <issue id="2016-10166" tracker="cve" />
  <issue id="2016-10167" tracker="cve" />
  <issue id="2016-10168" tracker="cve" />
  <issue id="2016-7480" tracker="cve" />
  <issue id="2016-7479" tracker="cve" />
  <issue id="2016-7478" tracker="cve" />
  <issue id="2017-5340" tracker="cve" />
  <issue id="2016-9138" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>pgajdos</packager>
  <description>
This update for php7 fixes the following security issues:

- CVE-2016-7480: The SplObjectStorage unserialize implementation in
  ext/spl/spl_observer.c in PHP did not verify that a key is an object,
  which allowed remote attackers to execute arbitrary code or cause a denial
  of service (uninitialized memory access) via crafted serialized data.
  (bsc#1019568)
- CVE-2017-5340: Zend/zend_hash.c in PHP mishandled certain cases that
  require large array allocations, which allowed remote attackers to
  execute arbitrary code or cause a denial of service (integer overflow,
  uninitialized memory access, and use of arbitrary destructor function
  pointers) via crafted serialized data. (bsc#1019570)
- CVE-2016-7479: In all versions of PHP 7, during the unserialization
  process, resizing the 'properties' hash table of a serialized object may
  have lead to use-after-free. A remote attacker may exploit this bug to
  gain arbitrary code execution. (bsc#1019547)
- CVE-2016-7478: Zend/zend_exceptions.c in PHP allowed remote attackers to
  cause a denial of service (infinite loop) via a crafted Exception object
  in serialized data, a related issue to CVE-2015-8876.  (bsc#1019550)
- CVE-2016-10159: Integer overflow in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory consumption or application crash) via a truncated
  manifest entry in a PHAR archive. (bsc#1022255)
- CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function
  in ext/phar/phar.c in PHP allowed remote attackers to cause a denial
  of service (memory corruption) or possibly execute arbitrary code via
  a crafted PHAR archive with an alias mismatch. (bsc#1022257)
- CVE-2016-10161: The object_common1 function in
  ext/standard/var_unserializer.c in PHP allowed remote attackers to
  cause a denial of service (buffer over-read and application crash) via
  crafted serialized data that is mishandled in a finish_nested_data call.
  (bsc#1022260)
- CVE-2016-10162: The php_wddx_pop_element function in ext/wddx/wddx.c in
  PHP 7 allowed remote attackers to cause a denial of service (NULL pointer
  dereference and application crash) via an inapplicable class name in a
  wddxPacket XML document, leading to mishandling in a wddx_deserialize
  call. (bsc#1022262)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the PHP gd module
  (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to php out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the gd module could lead
  to memory corruption (bsc#1022265)
- CVE-2016-9138: PHP mishandled property modification during __wakeup
  processing, which allows remote attackers to cause a denial of
  service or possibly have unspecified other impact via crafted
  serialized data, as demonstrated by Exception::__toString with
  DateInterval::__wakeup. (bsc#1008026)
</description>
  <summary>Security update for php7</summary>
</patchinfo>
openSUSE Build Service is sponsored by