Security update for php53

Announcement ID: SUSE-SU-2017:2522-1
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2016-10168 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10397 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • CVE-2016-10397 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • CVE-2016-5766 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-11144 ( SUSE ): 4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  • CVE-2017-11144 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2017-11145 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE-2017-11147 ( SUSE ): 4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
  • CVE-2017-11147 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
  • CVE-2017-11147 ( NVD ): 9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
  • CVE-2017-11628 ( SUSE ): 7.0 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-11628 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-12933 ( SUSE ): 4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
  • CVE-2017-12933 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2017-7890 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2017-7890 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Affected Products:
  • SLES for SAP Applications 11-SP4
  • SUSE Linux Enterprise Server 11 SP4
  • SUSE Linux Enterprise Software Development Kit 11 SP4

An update that solves 10 vulnerabilities can now be installed.

Description:

This update for php53 fixes the several issues.

These security issues were fixed:

  • CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re was prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue could have had an unspecified impact on the integrity of PHP (bsc#1054430).
  • CVE-2017-11628: Stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could have caused a denial of service or potentially allowed executing code (bsc#1050726).
  • CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in the GD Graphics Library did not zero colorMap arrays use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information (bsc#1050241).
  • CVE-2016-5766: Integer overflow in the _gd2GetHeader in the GD Graphics Library (aka libgd) allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image (bsc#986386).
  • CVE-2017-11145: An error in the date extension's timelib_meridian parsing code could have been used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function (bsc#1048112).
  • CVE-2017-11146: Lack of bounds checks in timelib_meridian parse code could have lead to information leak [bsc#1048111]
  • CVE-2016-10397: Incorrect handling of various URI components in the URL parser could have been used by attackers to bypass hostname-specific URL checks (bsc#1047454).
  • CVE-2017-11147: The PHAR archive handler could have been used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function (bsc#1048094).
  • CVE-2017-11144: The openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could have lead to a crash of the PHP interpreter (bsc#1048096).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Software Development Kit 11 SP4
    zypper in -t patch sdksp4-php53-13282=1
  • SUSE Linux Enterprise Server 11 SP4
    zypper in -t patch slessp4-php53-13282=1
  • SLES for SAP Applications 11-SP4
    zypper in -t patch slessp4-php53-13282=1

Package List:

  • SUSE Linux Enterprise Software Development Kit 11 SP4 (s390x x86_64 i586 ppc64 ia64)
    • php53-imap-5.3.17-112.5.1
    • php53-sockets-5.3.17-112.5.1
    • php53-readline-5.3.17-112.5.1
    • php53-sqlite-5.3.17-112.5.1
    • php53-posix-5.3.17-112.5.1
    • php53-tidy-5.3.17-112.5.1
    • php53-devel-5.3.17-112.5.1
  • SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
    • php53-gettext-5.3.17-112.5.1
    • php53-snmp-5.3.17-112.5.1
    • php53-pdo-5.3.17-112.5.1
    • php53-sysvsem-5.3.17-112.5.1
    • php53-tokenizer-5.3.17-112.5.1
    • php53-json-5.3.17-112.5.1
    • php53-gd-5.3.17-112.5.1
    • php53-fileinfo-5.3.17-112.5.1
    • php53-sysvmsg-5.3.17-112.5.1
    • apache2-mod_php53-5.3.17-112.5.1
    • php53-pear-5.3.17-112.5.1
    • php53-bcmath-5.3.17-112.5.1
    • php53-exif-5.3.17-112.5.1
    • php53-fastcgi-5.3.17-112.5.1
    • php53-intl-5.3.17-112.5.1
    • php53-ctype-5.3.17-112.5.1
    • php53-pspell-5.3.17-112.5.1
    • php53-soap-5.3.17-112.5.1
    • php53-xmlrpc-5.3.17-112.5.1
    • php53-mysql-5.3.17-112.5.1
    • php53-pcntl-5.3.17-112.5.1
    • php53-zlib-5.3.17-112.5.1
    • php53-wddx-5.3.17-112.5.1
    • php53-sysvshm-5.3.17-112.5.1
    • php53-gmp-5.3.17-112.5.1
    • php53-xmlwriter-5.3.17-112.5.1
    • php53-5.3.17-112.5.1
    • php53-bz2-5.3.17-112.5.1
    • php53-mcrypt-5.3.17-112.5.1
    • php53-openssl-5.3.17-112.5.1
    • php53-calendar-5.3.17-112.5.1
    • php53-zip-5.3.17-112.5.1
    • php53-dom-5.3.17-112.5.1
    • php53-ldap-5.3.17-112.5.1
    • php53-suhosin-5.3.17-112.5.1
    • php53-xsl-5.3.17-112.5.1
    • php53-iconv-5.3.17-112.5.1
    • php53-shmop-5.3.17-112.5.1
    • php53-odbc-5.3.17-112.5.1
    • php53-pgsql-5.3.17-112.5.1
    • php53-mbstring-5.3.17-112.5.1
    • php53-ftp-5.3.17-112.5.1
    • php53-curl-5.3.17-112.5.1
    • php53-dba-5.3.17-112.5.1
    • php53-xmlreader-5.3.17-112.5.1
  • SLES for SAP Applications 11-SP4 (ppc64 x86_64)
    • php53-gettext-5.3.17-112.5.1
    • php53-snmp-5.3.17-112.5.1
    • php53-pdo-5.3.17-112.5.1
    • php53-sysvsem-5.3.17-112.5.1
    • php53-tokenizer-5.3.17-112.5.1
    • php53-json-5.3.17-112.5.1
    • php53-gd-5.3.17-112.5.1
    • php53-fileinfo-5.3.17-112.5.1
    • php53-sysvmsg-5.3.17-112.5.1
    • apache2-mod_php53-5.3.17-112.5.1
    • php53-pear-5.3.17-112.5.1
    • php53-bcmath-5.3.17-112.5.1
    • php53-exif-5.3.17-112.5.1
    • php53-fastcgi-5.3.17-112.5.1
    • php53-intl-5.3.17-112.5.1
    • php53-ctype-5.3.17-112.5.1
    • php53-pspell-5.3.17-112.5.1
    • php53-soap-5.3.17-112.5.1
    • php53-xmlrpc-5.3.17-112.5.1
    • php53-mysql-5.3.17-112.5.1
    • php53-pcntl-5.3.17-112.5.1
    • php53-zlib-5.3.17-112.5.1
    • php53-wddx-5.3.17-112.5.1
    • php53-sysvshm-5.3.17-112.5.1
    • php53-gmp-5.3.17-112.5.1
    • php53-xmlwriter-5.3.17-112.5.1
    • php53-5.3.17-112.5.1
    • php53-bz2-5.3.17-112.5.1
    • php53-mcrypt-5.3.17-112.5.1
    • php53-openssl-5.3.17-112.5.1
    • php53-calendar-5.3.17-112.5.1
    • php53-zip-5.3.17-112.5.1
    • php53-dom-5.3.17-112.5.1
    • php53-ldap-5.3.17-112.5.1
    • php53-suhosin-5.3.17-112.5.1
    • php53-xsl-5.3.17-112.5.1
    • php53-iconv-5.3.17-112.5.1
    • php53-shmop-5.3.17-112.5.1
    • php53-odbc-5.3.17-112.5.1
    • php53-pgsql-5.3.17-112.5.1
    • php53-mbstring-5.3.17-112.5.1
    • php53-ftp-5.3.17-112.5.1
    • php53-curl-5.3.17-112.5.1
    • php53-dba-5.3.17-112.5.1
    • php53-xmlreader-5.3.17-112.5.1

References: