rh-php56-2.3-1.el7, rh-php56-php-5.6.25-1.el7, rh-php56-php-pear-1.9.5-4.el7

エラータID: AXSA:2016-942:01

Release date: 
Wednesday, November 16, 2016 - 22:29
Subject: 
rh-php56-2.3-1.el7, rh-php56-php-5.6.25-1.el7, rh-php56-php-pear-1.9.5-4.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

rh-php56
This is the main package for rh-php56 Software Collection,
that install PHP 5.6 language.

rh-php56-php
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.

This package contains the module (often referred to as mod_php)
which adds support for the PHP language to Apache HTTP 2.4 Server.

rh-php56-php-pear

Security issues fixed with this release:

CVE-2013-7456
gd_interpolation.c in the GD Graphics Library (aka libgd) before
2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x
before 7.0.7, allows remote attackers to cause a denial of service
(out-of-bounds read) or possibly have unspecified other impact via a
crafted image that is mishandled by the imagescale function.
CVE-2014-9767
Directory traversal vulnerability in the ZipArchive::extractTo
function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before
5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before
3.12.1 allows remote attackers to create arbitrary empty directories
via a crafted ZIP archive.
CVE-2015-2325
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2326
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-2327
PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and
related patterns with certain internal recursive back references,
which allows remote attackers to cause a denial of service
(segmentation fault) or possibly have unspecified other impact via a
crafted regular expression, as demonstrated by a JavaScript RegExp
object encountered by Konqueror.
CVE-2015-2328
PCRE before 8.36 mishandles the /((?(R)a|(?1))) / pattern and related
patterns with certain recursion, which allows remote attackers to
cause a denial of service (segmentation fault) or possibly have
unspecified other impact via a crafted regular expression, as
demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-3210
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-3217
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-5073
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-8381
The compile_regex function in pcre_compile.c in PCRE before 8.38 and
pcre2_compile.c in PCRE2 before 10.2x mishandles the
/(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and
/(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/
patterns, and related patterns with certain group references, which
allows remote attackers to cause a denial of service (heap-based
buffer overflow) or possibly have unspecified other impact via a
crafted regular expression, as demonstrated by a JavaScript RegExp
object encountered by Konqueror.
CVE-2015-8383
PCRE before 8.38 mishandles certain repeated conditional groups, which
allows remote attackers to cause a denial of service (buffer overflow)
or possibly have unspecified other impact via a crafted regular
expression, as demonstrated by a JavaScript RegExp object encountered
by Konqueror.
CVE-2015-8384
PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and
related patterns with certain recursive back references, which allows
remote attackers to cause a denial of service (buffer overflow) or
possibly have unspecified other impact via a crafted regular
expression, as demonstrated by a JavaScript RegExp object encountered
by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.
CVE-2015-8385
PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and
related patterns with certain forward references, which allows remote
attackers to cause a denial of service (buffer overflow) or possibly
have unspecified other impact via a crafted regular expression, as
demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8386
PCRE before 8.38 mishandles the interaction of lookbehind assertions
and mutually recursive subpatterns, which allows remote attackers to
cause a denial of service (buffer overflow) or possibly have
unspecified other impact via a crafted regular expression, as
demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8388
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and
related patterns with an unmatched closing parenthesis, which allows
remote attackers to cause a denial of service (buffer overflow) or
possibly have unspecified other impact via a crafted regular
expression, as demonstrated by a JavaScript RegExp object encountered
by Konqueror.
CVE-2015-8391
The pcre_compile function in pcre_compile.c in PCRE before 8.38
mishandles certain [: nesting, which allows remote attackers to cause
a denial of service (CPU consumption) or possibly have unspecified
other impact via a crafted regular expression, as demonstrated by a
JavaScript RegExp object encountered by Konqueror.
CVE-2015-8392
PCRE before 8.38 mishandles certain instances of the (?| substring,
which allows remote attackers to cause a denial of service (unintended
recursion and buffer overflow) or possibly have unspecified other
impact via a crafted regular expression, as demonstrated by a
JavaScript RegExp object encountered by Konqueror, a related issue to
CVE-2015-8384 and CVE-2015-8395.
CVE-2015-8395
PCRE before 8.38 mishandles certain references, which allows remote
attackers to cause a denial of service or possibly have unspecified
other impact via a crafted regular expression, as demonstrated by a
JavaScript RegExp object encountered by Konqueror, a related issue to
CVE-2015-8384 and CVE-2015-8392.
CVE-2015-8835
The make_http_soap_request function in ext/soap/php_http.c in PHP
before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not
properly retrieve keys, which allows remote attackers to cause a
denial of service (NULL pointer dereference, type confusion, and
application crash) or possibly execute arbitrary code via crafted
serialized data representing a numerically indexed _cookies array,
related to the SoapClient::__call method in ext/soap/soap.c.
CVE-2015-8865
The file_check_mem function in funcs.c in file before 5.23, as used in
the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and
7.x before 7.0.5, mishandles continuation-level jumps, which allows
context-dependent attackers to cause a denial of service (buffer
overflow and application crash) or possibly execute arbitrary code via
a crafted magic file.
CVE-2015-8866
ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when
PHP-FPM is used, does not isolate each thread from
libxml_disable_entity_loader changes in other threads, which allows
remote attackers to conduct XML External Entity (XXE) and XML Entity
Expansion (XEE) attacks via a crafted XML document, a related issue to
CVE-2015-5161.
CVE-2015-8867
The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in
PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12
incorrectly relies on the deprecated RAND_pseudo_bytes function, which
makes it easier for remote attackers to defeat cryptographic
protection mechanisms via unspecified vectors.
CVE-2015-8873
Stack consumption vulnerability in Zend/zend_exceptions.c in PHP
before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows
remote attackers to cause a denial of service (segmentation fault) via
recursive method calls.
CVE-2015-8874
Stack consumption vulnerability in GD in PHP before 5.6.12 allows
remote attackers to cause a denial of service via a crafted
imagefilltoborder call.
CVE-2015-8876
Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and
5.6.x before 5.6.12 does not validate certain Exception objects, which
allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) or trigger unintended method
execution via crafted serialized data.
CVE-2015-8877
The gdImageScaleTwoPass function in gd_interpolation.c in the GD
Graphics Library (aka libgd) before 2.2.0, as used in PHP before
5.6.12, uses inconsistent allocate and free approaches, which allows
remote attackers to cause a denial of service (memory consumption) via
a crafted call, as demonstrated by a call to the PHP imagescale
function.
CVE-2015-8879
The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12
mishandles driver behavior for SQL_WVARCHAR columns, which allows
remote attackers to cause a denial of service (application crash) in
opportunistic circumstances by leveraging use of the odbc_fetch_array
function to access a certain type of Microsoft SQL Server table.
CVE-2016-1903
The gdImageRotateInterpolated function in
ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before
5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain
sensitive information or cause a denial of service (out-of-bounds read
and application crash) via a large bgd_color argument to the
imagerotate function.
CVE-2016-2554
Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32,
5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to
cause a denial of service (application crash) or possibly have
unspecified other impact via a crafted TAR archive.
CVE-2016-3074
Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or
libgd2) allows remote attackers to cause a denial of service (crash)
or potentially execute arbitrary code via crafted compressed gd2 data,
which triggers a heap-based buffer overflow.
CVE-2016-3141
Use-after-free vulnerability in wddx.c in the WDDX extension in PHP
before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause
a denial of service (memory corruption and application crash) or
possibly have unspecified other impact by triggering a
wddx_deserialize call on XML data containing a crafted var element.
CVE-2016-3142
The phar_parse_zipfile function in zip.c in the PHAR extension in PHP
before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to
obtain sensitive information from process memory or cause a denial of
service (out-of-bounds read and application crash) by placing a
PK\x05\x06 signature at an invalid location.
CVE-2016-4070
** DISPUTED ** Integer overflow in the php_raw_url_encode function in
ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x
before 7.0.5 allows remote attackers to cause a denial of service
(application crash) via a long string to the rawurlencode function.
NOTE: the vendor says "Not sure if this qualifies as security issue
(probably not)."
CVE-2016-4071
Format string vulnerability in the php_snmp_error function in
ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x
before 7.0.5 allows remote attackers to execute arbitrary code via
format string specifiers in an SNMP::get call.
CVE-2016-4072
The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x
before 7.0.5 allows remote attackers to execute arbitrary code via a
crafted filename, as demonstrated by mishandling of \0 characters by
the phar_analyze_path function in ext/phar/phar.c.
CVE-2016-4073
Multiple integer overflows in the mbfl_strcut function in
ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x
before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a
denial of service (application crash) or possibly execute arbitrary
code via a crafted mb_strcut call.
CVE-2016-4342
ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and
7.x before 7.0.3 mishandles zero-length uncompressed data, which
allows remote attackers to cause a denial of service (heap memory
corruption) or possibly have unspecified other impact via a crafted
(1) TAR, (2) ZIP, or (3) PHAR archive.
CVE-2016-4343
The phar_make_dirstream function in ext/phar/dirstream.c in PHP before
5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files,
which allows remote attackers to cause a denial of service
(uninitialized pointer dereference) or possibly have unspecified other
impact via a crafted TAR archive.
CVE-2016-4473
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-4537
The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35,
5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer
for the scale argument, which allows remote attackers to cause a
denial of service or possibly have unspecified other impact via a
crafted call.
CVE-2016-4538
The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35,
5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data
structures without considering whether they are copies of the _zero_,
_one_, or _two_ global variable, which allows remote attackers to
cause a denial of service or possibly have unspecified other impact
via a crafted call.
CVE-2016-4539
The xml_parse_into_struct function in ext/xml/xml.c in PHP before
5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote
attackers to cause a denial of service (buffer under-read and
segmentation fault) or possibly have unspecified other impact via
crafted XML data in the second argument, leading to a parser level of
zero.
CVE-2016-4540
The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c
in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows
remote attackers to cause a denial of service (out-of-bounds read) or
possibly have unspecified other impact via a negative offset.
CVE-2016-4541
The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in
PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows
remote attackers to cause a denial of service (out-of-bounds read) or
possibly have unspecified other impact via a negative offset.
CVE-2016-4542
The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before
5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly
construct spprintf arguments, which allows remote attackers to cause a
denial of service (out-of-bounds read) or possibly have unspecified
other impact via crafted header data.
CVE-2016-4543
The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before
5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate
IFD sizes, which allows remote attackers to cause a denial of service
(out-of-bounds read) or possibly have unspecified other impact via
crafted header data.
CVE-2016-4544
The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP
before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not
validate TIFF start data, which allows remote attackers to cause a
denial of service (out-of-bounds read) or possibly have unspecified
other impact via crafted header data.
CVE-2016-5093
The get_icu_value_internal function in
ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before
5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0'
character, which allows remote attackers to cause a denial of service
(out-of-bounds read) or possibly have unspecified other impact via a
crafted locale_get_primary_language call.
CVE-2016-5094
Integer overflow in the php_html_entities function in
ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22
allows remote attackers to cause a denial of service or possibly have
unspecified other impact by triggering a large output string from the
htmlspecialchars function.
CVE-2016-5096
Integer overflow in the fread function in ext/standard/file.c in PHP
before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause
a denial of service or possibly have unspecified other impact via a
large integer in the second argument.
CVE-2016-5114
sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and
7.x before 7.0.2 misinterprets the semantics of the snprintf return
value, which allows attackers to obtain sensitive information from
process memory or cause a denial of service (out-of-bounds read and
buffer overflow) via a long string, as demonstrated by a long URI in a
configuration with custom REQUEST_URI logging.
CVE-2016-5399
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-5766
Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD
Graphics Library (aka libgd) before 2.2.3, as used in PHP before
5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote
attackers to cause a denial of service (heap-based buffer overflow and
application crash) or possibly have unspecified other impact via
crafted chunk dimensions in an image.
CVE-2016-5767
Integer overflow in the gdImageCreate function in gd.c in the GD
Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before
5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote
attackers to cause a denial of service (heap-based buffer overflow and
application crash) or possibly have unspecified other impact via a
crafted image dimensions.
CVE-2016-5768
Double free vulnerability in the _php_mb_regex_ereg_replace_exec
function in php_mbregex.c in the mbstring extension in PHP before
5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote
attackers to execute arbitrary code or cause a denial of service
(application crash) by leveraging a callback exception.
CVE-2016-5770
Integer overflow in the SplFileObject::fread function in
spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x
before 5.6.23 allows remote attackers to cause a denial of service or
possibly have unspecified other impact via a large integer argument, a
related issue to CVE-2016-5096.
CVE-2016-5771
spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before
5.6.23 improperly interacts with the unserialize implementation and
garbage collection, which allows remote attackers to execute arbitrary
code or cause a denial of service (use-after-free and application
crash) via crafted serialized data.
CVE-2016-5772
Double free vulnerability in the php_wddx_process_data function in
wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before
5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial
of service (application crash) or possibly execute arbitrary code via
crafted XML data that is mishandled in a wddx_deserialize call.
CVE-2016-5773
php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before
5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize
implementation and garbage collection, which allows remote attackers
to execute arbitrary code or cause a denial of service (use-after-free
and application crash) via crafted serialized data containing a
ZipArchive object.
CVE-2016-6128
The gdImageCropThreshold function in gd_crop.c in the GD Graphics
Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows
remote attackers to cause a denial of service (application crash) via
an invalid color index.
CVE-2016-6207
Integer overflow in the _gdContributionsAlloc function in
gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3
allows remote attackers to cause a denial of service (out-of-bounds
memory write or memory consumption) via unspecified vectors.
CVE-2016-6288
The php_url_parse_ex function in ext/standard/url.c in PHP before
5.5.38 allows remote attackers to cause a denial of service (buffer
over-read) or possibly have unspecified other impact via vectors
involving the smart_str data type.
CVE-2016-6289
Integer overflow in the virtual_file_ex function in
TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and
7.x before 7.0.9 allows remote attackers to cause a denial of service
(stack-based buffer overflow) or possibly have unspecified other
impact via a crafted extract operation on a ZIP archive.
CVE-2016-6290
ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and
7.x before 7.0.9 does not properly maintain a certain hash data
structure, which allows remote attackers to cause a denial of service
(use-after-free) or possibly have unspecified other impact via vectors
related to session deserialization.
CVE-2016-6291
The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP
before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote
attackers to cause a denial of service (out-of-bounds array access and
memory corruption), obtain sensitive information from process memory,
or possibly have unspecified other impact via a crafted JPEG image.
CVE-2016-6292
The exif_process_user_comment function in ext/exif/exif.c in PHP
before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote
attackers to cause a denial of service (NULL pointer dereference and
application crash) via a crafted JPEG image.
CVE-2016-6294
The locale_accept_from_http function in
ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before
5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the
ICU uloc_acceptLanguageFromHTTP function, which allows remote
attackers to cause a denial of service (out-of-bounds read) or
possibly have unspecified other impact via a call with a long
argument.
CVE-2016-6295
ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x
before 7.0.9 improperly interacts with the unserialize implementation
and garbage collection, which allows remote attackers to cause a
denial of service (use-after-free and application crash) or possibly
have unspecified other impact via crafted serialized data, a related
issue to CVE-2016-5773.
CVE-2016-6296
Integer signedness error in the simplestring_addn function in
simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before
5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote
attackers to cause a denial of service (heap-based buffer overflow) or
possibly have unspecified other impact via a long first argument to
the PHP xmlrpc_encode_request function.
CVE-2016-6297
Integer overflow in the php_stream_zip_opener function in
ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and
7.x before 7.0.9 allows remote attackers to cause a denial of service
(stack-based buffer overflow) or possibly have unspecified other
impact via a crafted zip:// URL.
CVE-2016-7124
ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before
7.0.10 mishandles certain invalid objects, which allows remote
attackers to cause a denial of service or possibly have unspecified
other impact via crafted serialized data that leads to a (1)
__destruct call or (2) magic method call.
CVE-2016-7125
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips
invalid session names in a way that triggers incorrect parsing, which
allows remote attackers to inject arbitrary-type session data by
leveraging control of a session name, as demonstrated by object
injection.
CVE-2016-7126
The imagetruecolortopalette function in ext/gd/gd.c in PHP before
5.6.25 and 7.x before 7.0.10 does not properly validate the number of
colors, which allows remote attackers to cause a denial of service
(select_colors allocation error and out-of-bounds write) or possibly
have unspecified other impact via a large value in the third argument.
CVE-2016-7127
The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and
7.x before 7.0.10 does not properly validate gamma values, which
allows remote attackers to cause a denial of service (out-of-bounds
write) or possibly have unspecified other impact by providing
different signs for the second and third arguments.
CVE-2016-7128
The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before
5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset
that exceeds the file size, which allows remote attackers to obtain
sensitive information from process memory via a crafted TIFF image.
CVE-2016-7129
The php_wddx_process_data function in ext/wddx/wddx.c in PHP before
5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial
of service (segmentation fault) or possibly have unspecified other
impact via an invalid ISO 8601 time value, as demonstrated by a
wddx_deserialize call that mishandles a dateTime element in a
wddxPacket XML document.
CVE-2016-7130
The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before
5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial
of service (NULL pointer dereference and application crash) or
possibly have unspecified other impact via an invalid base64 binary
value, as demonstrated by a wddx_deserialize call that mishandles a
binary element in a wddxPacket XML document.
CVE-2016-7131
ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows
remote attackers to cause a denial of service (NULL pointer
dereference and application crash) or possibly have unspecified other
impact via a malformed wddxPacket XML document that is mishandled in a
wddx_deserialize call, as demonstrated by a tag that lacks a < (less
than) character.
CVE-2016-7132
ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows
remote attackers to cause a denial of service (NULL pointer
dereference and application crash) or possibly have unspecified other
impact via an invalid wddxPacket XML document that is mishandled in a
wddx_deserialize call, as demonstrated by a stray element inside a
boolean element, leading to incorrect pop processing.

Security Fixes in the rh-php56-php component:

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. rh-php56-php-pear-1.9.5-4.el7.src.rpm
    MD5: e28c0d6ab8032a090694b8067485c12b
    SHA-256: e5b53ce9034954492a8184da881a6f1c990ce4f54b2634a09bf86ecb5454f9f8
    Size: 382.23 kB
  2. rh-php56-php-5.6.25-1.el7.src.rpm
    MD5: e597c807d1a89d8e744fbaa68477b12e
    SHA-256: a97a4f0f8600de9ba2246fd46551d9764b0211f935ea82718aa2782932508b7e
    Size: 12.16 MB
  3. rh-php56-2.3-1.el7.src.rpm
    MD5: ba04fd0b283379fa51f4f8d9983201b6
    SHA-256: d07e71cadb5a304604e38cefeb75687028aa0668ab3a0d5fd9889d03e7ba39d5
    Size: 14.93 kB

Asianux Server 7 for x86_64
  1. rh-php56-php-pear-1.9.5-4.el7.noarch.rpm
    MD5: 60da4fea47e82d0d6b073bb354fb3532
    SHA-256: 76ecd0eca561b5da847575a20a0e64d1ebd8c21ca31b56c5887c79125579a684
    Size: 366.43 kB
  2. rh-php56-php-5.6.25-1.el7.x86_64.rpm
    MD5: 9da710d642a87ae604df8ea6e4a26907
    SHA-256: 0e2e4e95b72eea3406d04e7e7b6f8d83a43f2cb7533dcc065dc463e5bf9ee8e0
    Size: 1.30 MB
  3. rh-php56-php-bcmath-5.6.25-1.el7.x86_64.rpm
    MD5: acbae35e466724be47ad0e718aaa7d6f
    SHA-256: 83a906ea674f4c2c296a081ee16ea14d3eb808020456a675bb2924e383680583
    Size: 58.66 kB
  4. rh-php56-php-cli-5.6.25-1.el7.x86_64.rpm
    MD5: b5422c5df969f9d5d384ba8a54bf9719
    SHA-256: c0ce9e82d63bb82f887424697dffe300a3497d5c991922c65ed5c3a5b2f4a267
    Size: 2.64 MB
  5. rh-php56-php-common-5.6.25-1.el7.x86_64.rpm
    MD5: 8aeb6b0215961833f6cdc245ddbce4e8
    SHA-256: 25ef4059aad4a2967adc838f58fa8047f24fc2f8a6c49e3af77cdbb5e31f6796
    Size: 742.58 kB
  6. rh-php56-php-dba-5.6.25-1.el7.x86_64.rpm
    MD5: 26a4f361e4f008413d759e9681246606
    SHA-256: af27228e56d9edd39f0ed117887d52250b9c1faca02b5ff6795f9b5aa7fbd880
    Size: 57.06 kB
  7. rh-php56-php-dbg-5.6.25-1.el7.x86_64.rpm
    MD5: 8272bebbc955b6e66659258e55dd5df5
    SHA-256: e19fc17e769534b9eeaeb254f34ce283633f52acf68b87efe367de5e89a59b92
    Size: 1.36 MB
  8. rh-php56-php-devel-5.6.25-1.el7.x86_64.rpm
    MD5: 070d73b0bf0597a854c7c2a46364da35
    SHA-256: c06441fabe0519f5bb9081a060b32bdf6e70cfe76657bd442cf5814c0a99093b
    Size: 628.56 kB
  9. rh-php56-php-embedded-5.6.25-1.el7.x86_64.rpm
    MD5: dc2642caf2eddda7a48fc95952c71d74
    SHA-256: 642f7d95ce041110402f9357c24ad989846cafce9f6727555488defee464f32a
    Size: 1.29 MB
  10. rh-php56-php-enchant-5.6.25-1.el7.x86_64.rpm
    MD5: 8e14994b62e66604a58a97d25c68d249
    SHA-256: cf5a0830073bde27b0786e7e411b72abd58291201c197a644a6277d7dac7b0a2
    Size: 43.21 kB
  11. rh-php56-php-fpm-5.6.25-1.el7.x86_64.rpm
    MD5: 2a72f915cf29f6181c632bd1d3a8c57e
    SHA-256: 2b2ce4f7881cce979ae59e7e3a57045b20d924975050d32e527db677d19d8cb7
    Size: 1.37 MB
  12. rh-php56-php-gd-5.6.25-1.el7.x86_64.rpm
    MD5: 08b35613c10ce3b02d5d2b056dc9b937
    SHA-256: 44e85c0f6331475a9b38c58dc5c5bbcf337069930af4496d59e92aab3d598610
    Size: 157.18 kB
  13. rh-php56-php-gmp-5.6.25-1.el7.x86_64.rpm
    MD5: 601f2d09d9d26fe362344d1650c93f33
    SHA-256: 362ae6171905452de22f02b4124246fbfa29d412f601ce25a02e68f9cce78db5
    Size: 55.29 kB
  14. rh-php56-php-intl-5.6.25-1.el7.x86_64.rpm
    MD5: cccfb69ea3a79ec5db0785129424c4d7
    SHA-256: 1a8edebb9b446006a848617c028fa4644dd06f5a9ecef47b862a8240e1ca3d4d
    Size: 149.39 kB
  15. rh-php56-php-ldap-5.6.25-1.el7.x86_64.rpm
    MD5: ab86eef4c503c7d6c637b3b7212a4c38
    SHA-256: a7f1d6a5dbdc6768096838be2633f7e1f7b7e439e0353979f572717d0a442a7f
    Size: 56.38 kB
  16. rh-php56-php-mbstring-5.6.25-1.el7.x86_64.rpm
    MD5: 5f5e10cd7cf1135627df61534a6f058b
    SHA-256: 33b3f0aca89f45ee1440a1633ac0df9f500295a0e262ce9106681be4461499e1
    Size: 518.44 kB
  17. rh-php56-php-mysqlnd-5.6.25-1.el7.x86_64.rpm
    MD5: 18a1d0d32fb6a12a81a51359c6c1c9e2
    SHA-256: 56fd63498e421a4ce391ed9eafa80638e5472eb69008ae368a6ff58625f9d213
    Size: 185.07 kB
  18. rh-php56-php-odbc-5.6.25-1.el7.x86_64.rpm
    MD5: d4125fb3bb3874f6e7d7481906dee1dd
    SHA-256: 97d4c1258f4d9fdc7515fe49c11c7a3950437b82ee126d3ec939c254eba08316
    Size: 66.96 kB
  19. rh-php56-php-opcache-5.6.25-1.el7.x86_64.rpm
    MD5: c284e7404c83b90457c6fd4a1d65d800
    SHA-256: dba407c75802711fec9a71e698427781dc06fabc583be78f21e6c6208eb4d85c
    Size: 100.39 kB
  20. rh-php56-php-pdo-5.6.25-1.el7.x86_64.rpm
    MD5: 98ab269f59efac6a6b5f86f8de686ee2
    SHA-256: bf27747ff818e68989f3d11b2713727f860c810905152afcd43c0c3867726bef
    Size: 99.76 kB
  21. rh-php56-php-pgsql-5.6.25-1.el7.x86_64.rpm
    MD5: 9a1db607abffaea2b1d254f44cd6801c
    SHA-256: ff65d74cd058015a2299ad3a4bd56cfb24749adccaf232276f76343e7af06883
    Size: 94.84 kB
  22. rh-php56-php-process-5.6.25-1.el7.x86_64.rpm
    MD5: 8b34a82e704b9530b4c97345e99cdf73
    SHA-256: 818f4cc50c2c9d52ab35ce759e1c920cae8ff96bbf1e80ef7b6b97c1afa4a945
    Size: 60.82 kB
  23. rh-php56-php-pspell-5.6.25-1.el7.x86_64.rpm
    MD5: 9feb2fca3dfe37da77731f93d2e75a21
    SHA-256: 0fae65f7a318a4f26778d79f834e90bcee37bda0f64a20decdca481d22fbac36
    Size: 42.38 kB
  24. rh-php56-php-recode-5.6.25-1.el7.x86_64.rpm
    MD5: e7f75df4115af66d404ca5f8e140b999
    SHA-256: 65bfdb44a5bcc3a3f3b9d545587268efc1cbb8a263e6fc12ae6dcb4f65eb2a29
    Size: 39.30 kB
  25. rh-php56-php-snmp-5.6.25-1.el7.x86_64.rpm
    MD5: 0b58e85bc1559abe391b30e02c1626e7
    SHA-256: 09ecc9f07f0a918a249db622da437c80464e246db727ab187da63047ed64cab8
    Size: 53.95 kB
  26. rh-php56-php-soap-5.6.25-1.el7.x86_64.rpm
    MD5: 24319000f7a5d0b1dd8243b6eb42cb9b
    SHA-256: a2a2fff4ee3195c752f0acbe1b72d51eb351f678a2eb9a591881b4bc5e81dd78
    Size: 164.32 kB
  27. rh-php56-php-xml-5.6.25-1.el7.x86_64.rpm
    MD5: 4be14289933ec791d740269e395ca0eb
    SHA-256: 900656ee1c7ee0debf80adb70f707e14b36126aae9c020a7d7a0b170fde6b674
    Size: 161.96 kB
  28. rh-php56-php-xmlrpc-5.6.25-1.el7.x86_64.rpm
    MD5: 0e518b1c660c60d761e4ae6a910c6609
    SHA-256: 2d7ff82b8df611a3af24cc44f152ad621171e4b5e5d13e2b7adfed005db4e55b
    Size: 69.02 kB
  29. rh-php56-runtime-2.3-1.el7.x86_64.rpm
    MD5: 3c90b248e3fcf21a92d69ecd0ca02d78
    SHA-256: d70b4847c9902c57c9426f2a0b968d1a80a76b818b0b27df6cae6a9f453a7bac
    Size: 1.15 MB