|
148 | 148 | </ul></li>
|
149 | 149 | <li>Wddx:
|
150 | 150 | <ul>
|
151 |
| - <li><?php bugfix(72564); ?> (boolean always deserialized as "true") (Remi)</li> |
| 151 | + <li><?php bugfix(72564); ?> (boolean always deserialized as "true").</li> |
152 | 152 | <li><?php bugfix(72142); ?> (WDDX Packet Injection Vulnerability in wddx_serialize_value()).</li>
|
153 | 153 | <li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access) (Stas)</li>
|
154 | 154 | <li><?php bugfix(72750); ?> (wddx_deserialize null dereference).</li>
|
|
168 | 168 | <ul><li>Core:
|
169 | 169 | <ul>
|
170 | 170 | <li><?php bugfix(72508); ?> (strange references after recursive function call and "switch" statement).</li>
|
171 |
| - <li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in virtual_file_ex).</li> |
172 |
| - <li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP libraries and applications).</li> |
| 171 | + <li><?php bugfix(72513); ?> (Stack-based buffer overflow vulnerability in virtual_file_ex). (CVE-2016-6289)</li> |
| 172 | + <li><?php bugfix(72573); ?> (HTTP_PROXY is improperly trusted by some PHP libraries and applications). (CVE-2016-5385)</li> |
173 | 173 | </ul></li>
|
174 | 174 | <li>bz2:
|
175 | 175 | <ul>
|
176 |
| - <li><?php bugfix(72613); ?> (Inadequate error handling in bzread()).</li> |
| 176 | + <li><?php bugfix(72613); ?> (Inadequate error handling in bzread()). (CVE-2016-5399)</li> |
177 | 177 | </ul></li>
|
178 | 178 | <li>CLI:
|
179 | 179 | <ul>
|
|
189 | 189 | </ul></li>
|
190 | 190 | <li>Exif:
|
191 | 191 | <ul>
|
192 |
| - <li><?php bugfix(72603); ?> (Out of bound read in exif_process_IFD_in_MAKERNOTE).</li> |
193 |
| - <li><?php bugfix(72618); ?> (NULL Pointer Dereference in exif_process_user_comment).</li> |
| 192 | + <li><?php bugfix(72603); ?> (Out of bound read in exif_process_IFD_in_MAKERNOTE). (CVE-2016-6291)</li> |
| 193 | + <li><?php bugfix(72618); ?> (NULL Pointer Dereference in exif_process_user_comment). (CVE-2016-6292)</li> |
194 | 194 | </ul></li>
|
195 | 195 | <li>GD:
|
196 | 196 | <ul>
|
|
199 | 199 | <li><?php bugfix(64641); ?> (imagefilledpolygon doesn't draw horizontal line).</li>
|
200 | 200 | <li><?php bugfix(72512); ?> (gdImageTrueColorToPaletteBody allows arbitrary write/read access).</li>
|
201 | 201 | <li><?php bugfix(72519); ?> (imagegif/output out-of-bounds access).</li>
|
202 |
| - <li><?php bugfix(72558); ?> (Integer overflow error within _gdContributionsAlloc()).</li> |
| 202 | + <li><?php bugfix(72558); ?> (Integer overflow error within _gdContributionsAlloc()). (CVE-2016-6207)</li> |
203 | 203 | <li><?php bugfix(72482); ?> (Ilegal write/read access caused by gdImageAALine overflow).</li>
|
204 | 204 | <li><?php bugfix(72494); ?> (imagecropauto out-of-bounds access).</li>
|
205 | 205 | </ul></li>
|
206 | 206 | <li>Intl:
|
207 | 207 | <ul>
|
208 |
| - <li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds access).</li> |
| 208 | + |
| 209 | + <li><?php bugfix(72533); ?> (locale_accept_from_http out-of-bounds access). (CVE-2016-6294)</li> |
209 | 210 | </ul></li>
|
210 | 211 | <li>Mbstring:
|
211 | 212 | <ul>
|
|
241 | 242 | </ul></li>
|
242 | 243 | <li>SNMP:
|
243 | 244 | <ul>
|
244 |
| - <li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC and unserialize()).</li> |
| 245 | + <li><?php bugfix(72479); ?> (Use After Free Vulnerability in SNMP with GC and unserialize()). (CVE-2016-6295)</li> |
245 | 246 | </ul></li>
|
246 | 247 | <li>Streams:
|
247 | 248 | <ul>
|
248 | 249 | <li><?php bugfix(72439); ?> (Stream socket with remote address leads to a segmentation fault).</li>
|
249 | 250 | </ul></li>
|
250 | 251 | <li>XMLRPC:
|
251 | 252 | <ul>
|
252 |
| - <li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn simplestring.c).</li> |
| 253 | + <li><?php bugfix(72606); ?> (heap-buffer-overflow (write) simplestring_addn simplestring.c). (CVE-2016-6296)</li> |
253 | 254 | </ul></li>
|
254 | 255 | <li>Zip:
|
255 | 256 | <ul>
|
256 |
| - <li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in php_stream_zip_opener).</li> |
| 257 | + <li><?php bugfix(72520); ?> (Stack-based buffer overflow vulnerability in php_stream_zip_opener). (CVE-2016-6297)</li> |
257 | 258 | </ul></li>
|
258 | 259 | </ul>
|
259 | 260 | <!-- }}} --></section>
|
|
0 commit comments