|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2016:2683-1)|
|Summary:||The remote host is missing an update for the 'php7' package(s) announced via the SUSE-SU-2016:2683-1 advisory.|
The remote host is missing an update for the 'php7' package(s) announced via the SUSE-SU-2016:2683-1 advisory.
This update for php7 fixes the following security issue:
- CVE-2016-7568: A specially crafted image file could cause an application
crash or potentially execute arbitrary code when the image is converted
to webp (bsc#1001900)
- CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf (bsc#1004924)
- CVE-2016-6911: Check for out-of-bound read in dynamicGetbuf()
'php7' package(s) on SUSE Linux Enterprise Software Development Kit 12-SP1, SUSE Linux Enterprise Module for Web Scripting 12
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2016-6911|
BugTraq ID: 95840
Debian Security Information: DSA-3693 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-7568
BugTraq ID: 93184
Common Vulnerability Exposure (CVE) ID: CVE-2016-8670
BugTraq ID: 93594
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.