File _patchinfo of Package patchinfo.4502
<patchinfo incident="4502">
<issue id="1040889" tracker="bnc">VUL-0: CVE-2017-9226: php5,php7,ruby,php53: heap out-of-bounds write orread occurs in next_state_val() during regular expression compilation</issue>
<issue id="1035111" tracker="bnc">VUL-1: CVE-2016-6294: php5,php53,php7: workaround for icu: locale_accept_from_http out-of-bounds access</issue>
<issue id="1040883" tracker="bnc">VUL-0: CVE-2017-9227: php5,php7,ruby,php53: stack out-of-bounds read in mbc_enc_len() during regular expression searching</issue>
<issue id="1040891" tracker="bnc">VUL-0: CVE-2017-9224: php5,php7,ruby,php53: stack out-of-bounds read occurs in match_at() during regular expression searching</issue>
<issue id="1032155" tracker="bnc">VUL-1: CVE-2017-6441: php7: denial of service (NULL pointer dereference and application crash) via crafted use of "declare(ticks="</issue>
<issue id="2017-6441" tracker="cve" />
<issue id="2016-6294" tracker="cve" />
<issue id="2017-9224" tracker="cve" />
<issue id="2017-9227" tracker="cve" />
<issue id="2017-9226" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>pgajdos</packager>
<description>This update for php7 fixes the following security issues:
- CVE-2017-9224: stack out-of-bounds read occurs in match_at() could lead to Denial of service (bsc#1040891)
- CVE-2017-9226: heap out-of-bounds write orread occurs in next_state_val() could lead to Denial of service(bsc#1040889)
- CVE-2017-9227: stack out-of-bounds read in mbc_enc_len() could lead to Denial of service (bsc#1040883)
- CVE-2017-6441: The _zval_get_long_func_ex in Zend/zend_operators.c in PHP allowed attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted use of "declare(ticks=" in a PHP script (bsc#1032155).
- CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111).
</description>
<summary>Security update for php7</summary>
</patchinfo>