<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for php5</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1197-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-06-26T13:20:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-06-26T13:20:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-06-26T13:20:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for php5</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The PHP script interpreter was updated to receive various security fixes:

* CVE-2015-4602 [bnc#935224]: Fixed an incomplete Class unserialization type confusion.
* CVE-2015-4599, CVE-2015-4600, CVE-2015-4601 [bnc#935226]: Fixed type confusion issues in unserialize() with various SOAP methods.
* CVE-2015-4603 [bnc#935234]: Fixed exception::getTraceAsString type confusion issue after unserialize.
* CVE-2015-4644 [bnc#935274]: Fixed a crash in php_pgsql_meta_data.
* CVE-2015-4643 [bnc#935275]: Fixed an integer overflow in ftp_genlist() that could result in a heap overflow.
* CVE-2015-3411, CVE-2015-3412, CVE-2015-4598 [bnc#935227], [bnc#935232]: Added missing null byte checks for paths in various PHP extensions.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1197-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="apache2-mod_php5-5.4.20-61.5">
      <FullProductName ProductID="apache2-mod_php5-5.4.20-61.5">apache2-mod_php5-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-5.4.20-61.5">
      <FullProductName ProductID="php5-5.4.20-61.5">php5-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-bcmath-5.4.20-61.5">
      <FullProductName ProductID="php5-bcmath-5.4.20-61.5">php5-bcmath-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-bz2-5.4.20-61.5">
      <FullProductName ProductID="php5-bz2-5.4.20-61.5">php5-bz2-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-calendar-5.4.20-61.5">
      <FullProductName ProductID="php5-calendar-5.4.20-61.5">php5-calendar-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-ctype-5.4.20-61.5">
      <FullProductName ProductID="php5-ctype-5.4.20-61.5">php5-ctype-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-curl-5.4.20-61.5">
      <FullProductName ProductID="php5-curl-5.4.20-61.5">php5-curl-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-dba-5.4.20-61.5">
      <FullProductName ProductID="php5-dba-5.4.20-61.5">php5-dba-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-devel-5.4.20-61.5">
      <FullProductName ProductID="php5-devel-5.4.20-61.5">php5-devel-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-dom-5.4.20-61.5">
      <FullProductName ProductID="php5-dom-5.4.20-61.5">php5-dom-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-enchant-5.4.20-61.5">
      <FullProductName ProductID="php5-enchant-5.4.20-61.5">php5-enchant-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-exif-5.4.20-61.5">
      <FullProductName ProductID="php5-exif-5.4.20-61.5">php5-exif-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-fastcgi-5.4.20-61.5">
      <FullProductName ProductID="php5-fastcgi-5.4.20-61.5">php5-fastcgi-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-fileinfo-5.4.20-61.5">
      <FullProductName ProductID="php5-fileinfo-5.4.20-61.5">php5-fileinfo-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-firebird-5.4.20-61.5">
      <FullProductName ProductID="php5-firebird-5.4.20-61.5">php5-firebird-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-fpm-5.4.20-61.5">
      <FullProductName ProductID="php5-fpm-5.4.20-61.5">php5-fpm-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-ftp-5.4.20-61.5">
      <FullProductName ProductID="php5-ftp-5.4.20-61.5">php5-ftp-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-gd-5.4.20-61.5">
      <FullProductName ProductID="php5-gd-5.4.20-61.5">php5-gd-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-gettext-5.4.20-61.5">
      <FullProductName ProductID="php5-gettext-5.4.20-61.5">php5-gettext-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-gmp-5.4.20-61.5">
      <FullProductName ProductID="php5-gmp-5.4.20-61.5">php5-gmp-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-iconv-5.4.20-61.5">
      <FullProductName ProductID="php5-iconv-5.4.20-61.5">php5-iconv-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-imap-5.4.20-61.5">
      <FullProductName ProductID="php5-imap-5.4.20-61.5">php5-imap-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-intl-5.4.20-61.5">
      <FullProductName ProductID="php5-intl-5.4.20-61.5">php5-intl-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-json-5.4.20-61.5">
      <FullProductName ProductID="php5-json-5.4.20-61.5">php5-json-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-ldap-5.4.20-61.5">
      <FullProductName ProductID="php5-ldap-5.4.20-61.5">php5-ldap-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mbstring-5.4.20-61.5">
      <FullProductName ProductID="php5-mbstring-5.4.20-61.5">php5-mbstring-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mcrypt-5.4.20-61.5">
      <FullProductName ProductID="php5-mcrypt-5.4.20-61.5">php5-mcrypt-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mssql-5.4.20-61.5">
      <FullProductName ProductID="php5-mssql-5.4.20-61.5">php5-mssql-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mysql-5.4.20-61.5">
      <FullProductName ProductID="php5-mysql-5.4.20-61.5">php5-mysql-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-odbc-5.4.20-61.5">
      <FullProductName ProductID="php5-odbc-5.4.20-61.5">php5-odbc-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-openssl-5.4.20-61.5">
      <FullProductName ProductID="php5-openssl-5.4.20-61.5">php5-openssl-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pcntl-5.4.20-61.5">
      <FullProductName ProductID="php5-pcntl-5.4.20-61.5">php5-pcntl-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pdo-5.4.20-61.5">
      <FullProductName ProductID="php5-pdo-5.4.20-61.5">php5-pdo-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pear-5.4.20-61.5">
      <FullProductName ProductID="php5-pear-5.4.20-61.5">php5-pear-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pgsql-5.4.20-61.5">
      <FullProductName ProductID="php5-pgsql-5.4.20-61.5">php5-pgsql-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-phar-5.4.20-61.5">
      <FullProductName ProductID="php5-phar-5.4.20-61.5">php5-phar-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-posix-5.4.20-61.5">
      <FullProductName ProductID="php5-posix-5.4.20-61.5">php5-posix-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pspell-5.4.20-61.5">
      <FullProductName ProductID="php5-pspell-5.4.20-61.5">php5-pspell-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-readline-5.4.20-61.5">
      <FullProductName ProductID="php5-readline-5.4.20-61.5">php5-readline-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-shmop-5.4.20-61.5">
      <FullProductName ProductID="php5-shmop-5.4.20-61.5">php5-shmop-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-snmp-5.4.20-61.5">
      <FullProductName ProductID="php5-snmp-5.4.20-61.5">php5-snmp-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-soap-5.4.20-61.5">
      <FullProductName ProductID="php5-soap-5.4.20-61.5">php5-soap-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sockets-5.4.20-61.5">
      <FullProductName ProductID="php5-sockets-5.4.20-61.5">php5-sockets-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sqlite-5.4.20-61.5">
      <FullProductName ProductID="php5-sqlite-5.4.20-61.5">php5-sqlite-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-suhosin-5.4.20-61.5">
      <FullProductName ProductID="php5-suhosin-5.4.20-61.5">php5-suhosin-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sysvmsg-5.4.20-61.5">
      <FullProductName ProductID="php5-sysvmsg-5.4.20-61.5">php5-sysvmsg-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sysvsem-5.4.20-61.5">
      <FullProductName ProductID="php5-sysvsem-5.4.20-61.5">php5-sysvsem-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sysvshm-5.4.20-61.5">
      <FullProductName ProductID="php5-sysvshm-5.4.20-61.5">php5-sysvshm-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-tidy-5.4.20-61.5">
      <FullProductName ProductID="php5-tidy-5.4.20-61.5">php5-tidy-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-tokenizer-5.4.20-61.5">
      <FullProductName ProductID="php5-tokenizer-5.4.20-61.5">php5-tokenizer-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-wddx-5.4.20-61.5">
      <FullProductName ProductID="php5-wddx-5.4.20-61.5">php5-wddx-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xmlreader-5.4.20-61.5">
      <FullProductName ProductID="php5-xmlreader-5.4.20-61.5">php5-xmlreader-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xmlrpc-5.4.20-61.5">
      <FullProductName ProductID="php5-xmlrpc-5.4.20-61.5">php5-xmlrpc-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xmlwriter-5.4.20-61.5">
      <FullProductName ProductID="php5-xmlwriter-5.4.20-61.5">php5-xmlwriter-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xsl-5.4.20-61.5">
      <FullProductName ProductID="php5-xsl-5.4.20-61.5">php5-xsl-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-zip-5.4.20-61.5">
      <FullProductName ProductID="php5-zip-5.4.20-61.5">php5-zip-5.4.20-61.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-zlib-5.4.20-61.5">
      <FullProductName ProductID="php5-zlib-5.4.20-61.5">php5-zlib-5.4.20-61.5</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.</Note>
    </Notes>
    <CVE>CVE-2015-3411</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3411.html</URL>
        <Description>CVE-2015-3411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935074</URL>
        <Description>SUSE Bug 935074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935227</URL>
        <Description>SUSE Bug 935227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935229</URL>
        <Description>SUSE Bug 935229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935232</URL>
        <Description>SUSE Bug 935232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.</Note>
    </Notes>
    <CVE>CVE-2015-3412</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3412.html</URL>
        <Description>CVE-2015-3412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935227</URL>
        <Description>SUSE Bug 935227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935229</URL>
        <Description>SUSE Bug 935229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935232</URL>
        <Description>SUSE Bug 935232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.</Note>
    </Notes>
    <CVE>CVE-2015-4598</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4598.html</URL>
        <Description>CVE-2015-4598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935227</URL>
        <Description>SUSE Bug 935227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935232</URL>
        <Description>SUSE Bug 935232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4599</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4599.html</URL>
        <Description>CVE-2015-4599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935074</URL>
        <Description>SUSE Bug 935074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935226</URL>
        <Description>SUSE Bug 935226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935234</URL>
        <Description>SUSE Bug 935234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.</Note>
    </Notes>
    <CVE>CVE-2015-4600</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4600.html</URL>
        <Description>CVE-2015-4600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935226</URL>
        <Description>SUSE Bug 935226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935234</URL>
        <Description>SUSE Bug 935234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.</Note>
    </Notes>
    <CVE>CVE-2015-4601</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4601.html</URL>
        <Description>CVE-2015-4601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935226</URL>
        <Description>SUSE Bug 935226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935234</URL>
        <Description>SUSE Bug 935234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4602</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4602.html</URL>
        <Description>CVE-2015-4602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935074</URL>
        <Description>SUSE Bug 935074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935224</URL>
        <Description>SUSE Bug 935224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935226</URL>
        <Description>SUSE Bug 935226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4603</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4603.html</URL>
        <Description>CVE-2015-4603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935074</URL>
        <Description>SUSE Bug 935074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935226</URL>
        <Description>SUSE Bug 935226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935234</URL>
        <Description>SUSE Bug 935234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.</Note>
    </Notes>
    <CVE>CVE-2015-4604</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4604.html</URL>
        <Description>CVE-2015-4604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935225</URL>
        <Description>SUSE Bug 935225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.</Note>
    </Notes>
    <CVE>CVE-2015-4605</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4605.html</URL>
        <Description>CVE-2015-4605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935225</URL>
        <Description>SUSE Bug 935225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.</Note>
    </Notes>
    <CVE>CVE-2015-4643</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4643.html</URL>
        <Description>CVE-2015-4643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931769</URL>
        <Description>SUSE Bug 931769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935074</URL>
        <Description>SUSE Bug 935074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935275</URL>
        <Description>SUSE Bug 935275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.</Note>
    </Notes>
    <CVE>CVE-2015-4644</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4644.html</URL>
        <Description>CVE-2015-4644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935074</URL>
        <Description>SUSE Bug 935074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935274</URL>
        <Description>SUSE Bug 935274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
