File _patchinfo of Package patchinfo.6924
<patchinfo incident="6924"> <issue id="1040883" tracker="bnc">VUL-0: CVE-2017-9227: php5,php7,ruby,php53: stack out-of-bounds read in mbc_enc_len() during regular expression searching</issue> <issue id="1040889" tracker="bnc">VUL-0: CVE-2017-9226: php5,php7,ruby,php53: heap out-of-bounds write orread occurs in next_state_val() during regular expression compilation</issue> <issue id="1040891" tracker="bnc">VUL-0: CVE-2017-9224: php5,php7,ruby,php53: stack out-of-bounds read occurs in match_at() during regular expression searching</issue> <issue id="1035111" tracker="bnc">VUL-1: CVE-2016-6294: php5,php53,php7: workaround for icu: locale_accept_from_http out-of-bounds access</issue> <issue id="2017-9224" tracker="cve" /> <issue id="2017-9227" tracker="cve" /> <issue id="2016-6294" tracker="cve" /> <issue id="2017-9226" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pgajdos</packager> <description>This update for php5 fixes the following security issues: - CVE-2016-6294: The locale_accept_from_http function in ext/intl/locale/locale_methods.c did not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument (bsc#1035111). - CVE-2017-9227: A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. (bsc#1040883) - CVE-2017-9226: A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. (bsc#1040889) - CVE-2017-9224: A stack out-of-bounds read occurs in match_at() during regular expression searching. (bsc#1040891) This update was imported from the SUSE:SLE-12:Update update project.</description> <summary>Security update for php5</summary> </patchinfo>