[Secure-testing-commits] r42766 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Jun 24 10:38:47 UTC 2016


Author: carnil
Date: 2016-06-24 10:38:47 +0000 (Fri, 24 Jun 2016)
New Revision: 42766

Modified:
   data/CVE/list
Log:
php7.0 issues fixed in unstable

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-06-24 10:35:39 UTC (rev 42765)
+++ data/CVE/list	2016-06-24 10:38:47 UTC (rev 42766)
@@ -27,13 +27,13 @@
 	- wordpress 4.5.3+dfsg-1
 	NOTE: https://wordpress.org/news/2016/06/wordpress-4-5-3/
 CVE-2016-5773 [ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize]
-	- php7.0 <unfixed>
+	- php7.0 7.0.8-1
 	- php5 5.6.23+dfsg-1
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72434
 	NOTE: http://git.php.net/?p=php-src.git;a=commitdiff;h=f6aef68089221c5ea047d4a74224ee3deead99a6
 	NOTE: Fixed in 5.5.37, 5.6.23, 7.0.8
 CVE-2016-5772 [Double Free Courruption in wddx_deserialize]
-	- php7.0 <unfixed>
+	- php7.0 7.0.8-1
 	- php5 5.6.23+dfsg-1
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72340
 	NOTE: http://git.php.net/?p=php-src.git;a=commitdiff;h=a44c89e8af7c2410f4bfc5e097be2a5d0639a60c
@@ -46,25 +46,25 @@
 	NOTE: Fixed in 5.5.37, 5.6.23, 7.0.8
 	TODO: check if really affects 7.x, CVE assignment claims not
 CVE-2016-5770 [int/size_t confusion in SplFileObject::fread]
-	- php7.0 <unfixed>
+	- php7.0 7.0.8-1
 	- php5 5.6.23+dfsg-1
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72262
 	NOTE: http://git.php.net/?p=php-src.git;a=commitdiff;h=7245bff300d3fa8bacbef7897ff080a6f1c23eba
 	NOTE: Fixed in 5.5.37, 5.6.23, 7.0.8
 CVE-2016-5769 [Heap Overflow due to integer overflows]
-	- php7.0 <unfixed>
+	- php7.0 7.0.8-1
 	- php5 5.6.23+dfsg-1
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72455
 	NOTE: http://git.php.net/?p=php-src.git;a=commitdiff;h=6c5211a0cef0cc2854eaa387e0eb036e012904d0
 	NOTE: Fixed in 5.5.37, 5.6.23, 7.0.8
 CVE-2016-5768 [_php_mb_regex_ereg_replace_exec - double free]
-	- php7 <unfixed>
+	- php7 7.0.8-1
 	- php5 5.6.23+dfsg-1
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72402
 	NOTE: http://git.php.net/?p=php-src.git;a=commitdiff;h=5b597a2e5b28e2d5a52fc1be13f425f08f47cb62
 	NOTE: Fixed in 5.5.37, 5.6.23, 7.0.8
 CVE-2016-5767 [Integer Overflow in gdImagePaletteToTrueColor() resulting heap overflow]
-	- php7.0 <unfixed> (unimportant)
+	- php7.0 7.0.8-1 (unimportant)
 	- php5 5.6.23+dfsg-1 (unimportant)
 	NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72446
@@ -73,7 +73,7 @@
 	- libgd2 2.0.34~rc1-1
 	NOTE: Fixed by: https://github.com/libgd/libgd/commit/cfee163a5e848fc3e3fb1d05a30d7557cdd36457 (GD_2_0_34RC1)
 CVE-2016-5766 [Integer Overflow in _gd2GetHeader() resulting in heap overflow]
-	- php7.0 <unfixed> (unimportant)
+	- php7.0 7.0.8-1 (unimportant)
 	- php5 5.6.23+dfsg-1 (unimportant)
 	NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72339




More information about the Secure-testing-commits mailing list