MGASA-2016-0238

Source
https://advisories.mageia.org/MGASA-2016-0238.html
Import Source
https://advisories.mageia.org/MGASA-2016-0238.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0238
Related
Published
2016-07-05T15:47:08Z
Modified
2016-07-05T15:38:02Z
Summary
Updated php packages fix security vulnerability
Details

php-mbstring phpmbregexeregreplaceexec() - double free (CVE-2016-5768).

php-mcrypt heap Overflow due to integer overflows (CVE-2016-5769).

php-SPL int/size_t confusion in SplFileObject::fread (CVE-2016-5770).

php-SPL Use After Free Vulnerability in PHP's GC algorithm and unserialize (CVE-2016-5771).

php-WDDX Double Free Courruption in wddx_deserialize (CVE-2016-5772).

php-zip ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize (CVE-2016-5773).

The php package has been updated to version 5.6.23, fixing these issues and several other bugs. See the upstream ChangeLog for details.

References
Credits

Affected packages

Mageia:5 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.6.23-1.mga5

Ecosystem specific

{
    "section": "core"
}