[arch-security] [ASA-201611-19] php: multiple issues
anthraxx at archlinux.org
Fri Nov 18 16:30:20 UTC 2016
Arch Linux Security Advisory ASA-201611-19
Date : 2016-11-18
CVE-ID : CVE-2016-6911 CVE-2016-7568 CVE-2016-8670 CVE-2016-9138
Package : php
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package php before version 7.0.13-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Upgrade to 7.0.13-1.
# pacman -Syu "php>=7.0.13-1"
The problems have been fixed upstream in version 7.0.13.
- CVE-2016-6911 (denial of service)
It was found that the dynamicGetbuf() function doesn't check for out-
of-bounds read and returns a wrong return code, leading to denial of
- CVE-2016-7568 (arbitrary code execution)
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in gd. A specially crafted image, when converted to webp, could
cause the application to crash or potentially execute arbitrary code.
- CVE-2016-8670 (arbitrary code execution)
A stack based buffer overflow was found in the dynamicGetbuf function
when passing negative `rlen` as size to memcpy().
- CVE-2016-9138 (arbitrary code execution)
An use after free vulnerability was found in unserialize() via
DateInterval::__wakeup(), leading to arbitrary code execution.
A remote attacker is able to execute arbitrary code or crash the
application via various vectors.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: OpenPGP digital signature
More information about the arch-security