|
114 | 114 | <li><?php bugfix(72581); ?> (previous property undefined in Exception after deserialization).</li>
|
115 | 115 | <li>Implemented FR <?php bugl(72614); ?> (Support "nmake test" on building extensions by phpize).</li>
|
116 | 116 | <li><?php bugfix(72641); ?> (phpize (on Windows) ignores PHP_PREFIX).</li>
|
117 |
| - <li><?php bugfix(72663); ?> (Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization).</li> |
118 |
| - <li><?php bugfix(72681); ?> (PHP Session Data Injection Vulnerability).</li> |
| 117 | + <li><?php bugfix(72663); ?> (Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization). (CVE-2016-7124)</li> |
| 118 | + <li><?php bugfix(72681); ?> (PHP Session Data Injection Vulnerability). (CVE-2016-7125)</li> |
119 | 119 | </ul></li>
|
120 | 120 | <li>Bz2:
|
121 | 121 | <ul>
|
|
142 | 142 | </ul></li>
|
143 | 143 | <li>EXIF:
|
144 | 144 | <ul>
|
145 |
| - <li><?php bugfix(72627); ?> (Memory Leakage In exif_process_IFD_in_TIFF).</li> |
| 145 | + <li><?php bugfix(72627); ?> (Memory Leakage In exif_process_IFD_in_TIFF). (CVE-2016-7128)</li> |
146 | 146 | <li><?php bugfix(72735); ?> (Samsung picture thumb not read (zero size)).</li>
|
147 | 147 | </ul></li>
|
148 | 148 | <li>Filter:
|
|
161 | 161 | <li><?php bugfix(70315); ?> (500 Server Error but page is fully rendered).</li>
|
162 | 162 | <li><?php bugfix(72596); ?> (imagetypes function won't advertise WEBP support).</li>
|
163 | 163 | <li><?php bugfix(72604); ?> (imagearc() ignores thickness for full arcs).</li>
|
164 |
| - <li><?php bugfix(72697); ?> (select_colors write out-of-bounds).</li> |
| 164 | + <li><?php bugfix(72697); ?> (select_colors write out-of-bounds). (CVE-2016-7126)</li> |
165 | 165 | <li><?php bugfix(72709); ?> (imagesetstyle() causes OOB read for empty $styles).</li>
|
166 |
| - <li><?php bugfix(72730); ?> (imagegammacorrect allows arbitrary write access).</li> |
| 166 | + <li><?php bugfix(72730); ?> (imagegammacorrect allows arbitrary write access). (CVE-2016-7127)</li> |
167 | 167 | </ul></li>
|
168 | 168 | <li>Intl:
|
169 | 169 | <ul>
|
|
222 | 222 | <li>Wddx:
|
223 | 223 | <ul>
|
224 | 224 | <li><?php bugfix(72142); ?> (WDDX Packet Injection Vulnerability in wddx_serialize_value()).</li>
|
225 |
| - <li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access) (Stas)</li> |
226 |
| - <li><?php bugfix(72750); ?> (wddx_deserialize null dereference).</li> |
227 |
| - <li><?php bugfix(72790); ?> (wddx_deserialize null dereference with invalid xml).</li> |
228 |
| - <li><?php bugfix(72799); ?> (wddx_deserialize null dereference in php_wddx_pop_element).</li> |
| 225 | + <li><?php bugfix(72749); ?> (wddx_deserialize allows illegal memory access). (CVE-2016-7129)</li> |
| 226 | + <li><?php bugfix(72750); ?> (wddx_deserialize null dereference). (CVE-2016-7130)</li> |
| 227 | + <li><?php bugfix(72790); ?> (wddx_deserialize null dereference with invalid xml). (CVE-2016-7131)</li> |
| 228 | + <li><?php bugfix(72799); ?> (wddx_deserialize null dereference in php_wddx_pop_element). (CVE-2016-7132)</li> |
229 | 229 | </ul></li>
|
230 | 230 | </ul>
|
231 | 231 | <!-- }}} --></section>
|
|
0 commit comments