<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for php5</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1628-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-09-17T09:48:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-09-17T09:48:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-09-17T09:48:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for php5</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The PHP5 script interpreter was updated to fix various security issues:

* CVE-2015-6831: A use after free vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#942291] [bnc#942294] [bnc#942295]
* CVE-2015-6832: A dangling pointer in the unserialization of ArrayObject items could be used to crash php or potentially execute code. [bnc#942293]
* CVE-2015-6833: A directory traversal when extracting ZIP files could be used to overwrite files outside of intended area. [bnc#942296]
* CVE-2015-6834: A Use After Free Vulnerability in unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#945403] 
* CVE-2015-6835: A Use After Free Vulnerability in session unserialize() has been fixed which could be used to crash php or potentially execute code. [bnc#945402]
* CVE-2015-6836: A SOAP serialize_function_call() type confusion leading to remote code execution problem was fixed. [bnc#945428]
* CVE-2015-6837 CVE-2015-6838: Two NULL pointer dereferences in the XSLTProcessor class were fixed. [bnc#945412]
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1628-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="apache2-mod_php5-5.4.20-67.1">
      <FullProductName ProductID="apache2-mod_php5-5.4.20-67.1">apache2-mod_php5-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-5.4.20-67.1">
      <FullProductName ProductID="php5-5.4.20-67.1">php5-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-bcmath-5.4.20-67.1">
      <FullProductName ProductID="php5-bcmath-5.4.20-67.1">php5-bcmath-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-bz2-5.4.20-67.1">
      <FullProductName ProductID="php5-bz2-5.4.20-67.1">php5-bz2-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-calendar-5.4.20-67.1">
      <FullProductName ProductID="php5-calendar-5.4.20-67.1">php5-calendar-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-ctype-5.4.20-67.1">
      <FullProductName ProductID="php5-ctype-5.4.20-67.1">php5-ctype-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-curl-5.4.20-67.1">
      <FullProductName ProductID="php5-curl-5.4.20-67.1">php5-curl-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-dba-5.4.20-67.1">
      <FullProductName ProductID="php5-dba-5.4.20-67.1">php5-dba-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-devel-5.4.20-67.1">
      <FullProductName ProductID="php5-devel-5.4.20-67.1">php5-devel-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-dom-5.4.20-67.1">
      <FullProductName ProductID="php5-dom-5.4.20-67.1">php5-dom-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-enchant-5.4.20-67.1">
      <FullProductName ProductID="php5-enchant-5.4.20-67.1">php5-enchant-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-exif-5.4.20-67.1">
      <FullProductName ProductID="php5-exif-5.4.20-67.1">php5-exif-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-fastcgi-5.4.20-67.1">
      <FullProductName ProductID="php5-fastcgi-5.4.20-67.1">php5-fastcgi-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-fileinfo-5.4.20-67.1">
      <FullProductName ProductID="php5-fileinfo-5.4.20-67.1">php5-fileinfo-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-firebird-5.4.20-67.1">
      <FullProductName ProductID="php5-firebird-5.4.20-67.1">php5-firebird-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-fpm-5.4.20-67.1">
      <FullProductName ProductID="php5-fpm-5.4.20-67.1">php5-fpm-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-ftp-5.4.20-67.1">
      <FullProductName ProductID="php5-ftp-5.4.20-67.1">php5-ftp-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-gd-5.4.20-67.1">
      <FullProductName ProductID="php5-gd-5.4.20-67.1">php5-gd-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-gettext-5.4.20-67.1">
      <FullProductName ProductID="php5-gettext-5.4.20-67.1">php5-gettext-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-gmp-5.4.20-67.1">
      <FullProductName ProductID="php5-gmp-5.4.20-67.1">php5-gmp-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-iconv-5.4.20-67.1">
      <FullProductName ProductID="php5-iconv-5.4.20-67.1">php5-iconv-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-imap-5.4.20-67.1">
      <FullProductName ProductID="php5-imap-5.4.20-67.1">php5-imap-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-intl-5.4.20-67.1">
      <FullProductName ProductID="php5-intl-5.4.20-67.1">php5-intl-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-json-5.4.20-67.1">
      <FullProductName ProductID="php5-json-5.4.20-67.1">php5-json-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-ldap-5.4.20-67.1">
      <FullProductName ProductID="php5-ldap-5.4.20-67.1">php5-ldap-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mbstring-5.4.20-67.1">
      <FullProductName ProductID="php5-mbstring-5.4.20-67.1">php5-mbstring-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mcrypt-5.4.20-67.1">
      <FullProductName ProductID="php5-mcrypt-5.4.20-67.1">php5-mcrypt-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mssql-5.4.20-67.1">
      <FullProductName ProductID="php5-mssql-5.4.20-67.1">php5-mssql-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-mysql-5.4.20-67.1">
      <FullProductName ProductID="php5-mysql-5.4.20-67.1">php5-mysql-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-odbc-5.4.20-67.1">
      <FullProductName ProductID="php5-odbc-5.4.20-67.1">php5-odbc-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-openssl-5.4.20-67.1">
      <FullProductName ProductID="php5-openssl-5.4.20-67.1">php5-openssl-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pcntl-5.4.20-67.1">
      <FullProductName ProductID="php5-pcntl-5.4.20-67.1">php5-pcntl-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pdo-5.4.20-67.1">
      <FullProductName ProductID="php5-pdo-5.4.20-67.1">php5-pdo-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pear-5.4.20-67.1">
      <FullProductName ProductID="php5-pear-5.4.20-67.1">php5-pear-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pgsql-5.4.20-67.1">
      <FullProductName ProductID="php5-pgsql-5.4.20-67.1">php5-pgsql-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-phar-5.4.20-67.1">
      <FullProductName ProductID="php5-phar-5.4.20-67.1">php5-phar-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-posix-5.4.20-67.1">
      <FullProductName ProductID="php5-posix-5.4.20-67.1">php5-posix-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-pspell-5.4.20-67.1">
      <FullProductName ProductID="php5-pspell-5.4.20-67.1">php5-pspell-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-readline-5.4.20-67.1">
      <FullProductName ProductID="php5-readline-5.4.20-67.1">php5-readline-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-shmop-5.4.20-67.1">
      <FullProductName ProductID="php5-shmop-5.4.20-67.1">php5-shmop-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-snmp-5.4.20-67.1">
      <FullProductName ProductID="php5-snmp-5.4.20-67.1">php5-snmp-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-soap-5.4.20-67.1">
      <FullProductName ProductID="php5-soap-5.4.20-67.1">php5-soap-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sockets-5.4.20-67.1">
      <FullProductName ProductID="php5-sockets-5.4.20-67.1">php5-sockets-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sqlite-5.4.20-67.1">
      <FullProductName ProductID="php5-sqlite-5.4.20-67.1">php5-sqlite-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-suhosin-5.4.20-67.1">
      <FullProductName ProductID="php5-suhosin-5.4.20-67.1">php5-suhosin-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sysvmsg-5.4.20-67.1">
      <FullProductName ProductID="php5-sysvmsg-5.4.20-67.1">php5-sysvmsg-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sysvsem-5.4.20-67.1">
      <FullProductName ProductID="php5-sysvsem-5.4.20-67.1">php5-sysvsem-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-sysvshm-5.4.20-67.1">
      <FullProductName ProductID="php5-sysvshm-5.4.20-67.1">php5-sysvshm-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-tidy-5.4.20-67.1">
      <FullProductName ProductID="php5-tidy-5.4.20-67.1">php5-tidy-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-tokenizer-5.4.20-67.1">
      <FullProductName ProductID="php5-tokenizer-5.4.20-67.1">php5-tokenizer-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-wddx-5.4.20-67.1">
      <FullProductName ProductID="php5-wddx-5.4.20-67.1">php5-wddx-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xmlreader-5.4.20-67.1">
      <FullProductName ProductID="php5-xmlreader-5.4.20-67.1">php5-xmlreader-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xmlrpc-5.4.20-67.1">
      <FullProductName ProductID="php5-xmlrpc-5.4.20-67.1">php5-xmlrpc-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xmlwriter-5.4.20-67.1">
      <FullProductName ProductID="php5-xmlwriter-5.4.20-67.1">php5-xmlwriter-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-xsl-5.4.20-67.1">
      <FullProductName ProductID="php5-xsl-5.4.20-67.1">php5-xsl-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-zip-5.4.20-67.1">
      <FullProductName ProductID="php5-zip-5.4.20-67.1">php5-zip-5.4.20-67.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="php5-zlib-5.4.20-67.1">
      <FullProductName ProductID="php5-zlib-5.4.20-67.1">php5-zlib-5.4.20-67.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.</Note>
    </Notes>
    <CVE>CVE-2015-6831</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6831.html</URL>
        <Description>CVE-2015-6831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942291</URL>
        <Description>SUSE Bug 942291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942294</URL>
        <Description>SUSE Bug 942294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942295</URL>
        <Description>SUSE Bug 942295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945188</URL>
        <Description>SUSE Bug 945188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.</Note>
    </Notes>
    <CVE>CVE-2015-6832</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6832.html</URL>
        <Description>CVE-2015-6832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942293</URL>
        <Description>SUSE Bug 942293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945189</URL>
        <Description>SUSE Bug 945189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.</Note>
    </Notes>
    <CVE>CVE-2015-6833</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6833.html</URL>
        <Description>CVE-2015-6833</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942296</URL>
        <Description>SUSE Bug 942296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserialization.</Note>
    </Notes>
    <CVE>CVE-2015-6834</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6834.html</URL>
        <Description>CVE-2015-6834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015191</URL>
        <Description>SUSE Bug 1015191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945403</URL>
        <Description>SUSE Bug 945403</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.</Note>
    </Notes>
    <CVE>CVE-2015-6835</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6835.html</URL>
        <Description>CVE-2015-6835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945402</URL>
        <Description>SUSE Bug 945402</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.</Note>
    </Notes>
    <CVE>CVE-2015-6836</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6836.html</URL>
        <Description>CVE-2015-6836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945428</URL>
        <Description>SUSE Bug 945428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.</Note>
    </Notes>
    <CVE>CVE-2015-6837</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6837.html</URL>
        <Description>CVE-2015-6837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945412</URL>
        <Description>SUSE Bug 945412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.</Note>
    </Notes>
    <CVE>CVE-2015-6838</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00025.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6838.html</URL>
        <Description>CVE-2015-6838</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945412</URL>
        <Description>SUSE Bug 945412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980366</URL>
        <Description>SUSE Bug 980366</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
