|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2015:1466-1)|
|Summary:||The remote host is missing an update for the 'php53' package(s) announced via the SUSE-SU-2015:1466-1 advisory.|
The remote host is missing an update for the 'php53' package(s) announced via the SUSE-SU-2015:1466-1 advisory.
PHP was updated to fix two security issues.
The following vulnerabilities were fixed:
* CVE-2015-5589: PHP could be crashed when processing an invalid file with
the 'phar' extension with a segfault in Phar::convertToData, leading to
Denial of Service (DOS) (bsc#938721)
* CVE-2015-5590: PHP could be crashed or have unspecified other impact due
to a buffer overlow in phar_fix_filepath (bsc#938719)
'php53' package(s) on SUSE Linux Enterprise Software Development Kit 11-SP4, SUSE Linux Enterprise Software Development Kit 11-SP3, SUSE Linux Enterprise Server for VMWare 11-SP3, SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2015-5589|
BugTraq ID: 75974
Debian Security Information: DSA-3344 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2015-5590
BugTraq ID: 75970
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.