ALT-BU-2017-3492-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Package php7-openssl updated to version 7.1.11-alt1.M80P.1.1 for branch p8 in task 193050.
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Package php7-pgsql updated to version 7.1.11-alt1.M80P.1.2 for branch p8 in task 193050.
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Package php7-opcache updated to version 7.1.11-alt1.M80P.1.1 for branch p8 in task 193050.
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Package php7-xmlrpc updated to version 7.1.11-alt1.M80P.1 for branch p8 in task 193050.
Closed vulnerabilities
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Package kernel-image-un-def updated to version 4.13.12-alt0.M80P.1 for branch p8 in task 193477.
Closed vulnerabilities
BDU:2017-02559
Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-02561
Уязвимость функции cx231xx_usb_probe ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-02565
Уязвимость функции get_endpoints ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00066
Уязвимость функции qmi_wwan_bind (drivers/net/usb/qmi_wwan.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00067
Уязвимость функции usbnet_generic_cdc_bind (drivers/net/usb/cdc_ether.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00068
Уязвимость функции dvb_frontend_free (drivers/media/dvb-core/dvb_frontend.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00069
Уязвимость функции asix_suspend (drivers/net/usb/asix_devices.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00070
Уязвимость функции ims_pcu_get_cdc_union_desc (drivers/input/misc/ims-pcu.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00071
Уязвимость функции hdpvr_probe (drivers/media/usb/hdpvr/hdpvr-core.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00072
Уязвимость функции parse_hid_report_descriptor (drivers/input/tablet/gtco.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2017-15128
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df
- https://access.redhat.com/security/cve/CVE-2017-15128
- https://access.redhat.com/security/cve/CVE-2017-15128
- https://bugzilla.redhat.com/show_bug.cgi?id=1525222
- https://bugzilla.redhat.com/show_bug.cgi?id=1525222
- https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
- https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12
Modified: 2024-11-21
CVE-2017-16532
The get_endpoints function in drivers/usb/misc/usbtest.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
- https://github.com/torvalds/linux/commit/7c80f9e4a588f1925b07134bb2e3689335f6c6d8
- https://github.com/torvalds/linux/commit/7c80f9e4a588f1925b07134bb2e3689335f6c6d8
- https://groups.google.com/d/msg/syzkaller/l3870gs3LhA/y79DYQdFBAAJ
- https://groups.google.com/d/msg/syzkaller/l3870gs3LhA/y79DYQdFBAAJ
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-16536
The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
- https://groups.google.com/d/msg/syzkaller/WlUAVfDvpRk/1V1xuEA4AgAJ
- https://groups.google.com/d/msg/syzkaller/WlUAVfDvpRk/1V1xuEA4AgAJ
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- https://patchwork.kernel.org/patch/9963527/
- https://patchwork.kernel.org/patch/9963527/
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-16538
drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- https://groups.google.com/d/msg/syzkaller/XwNidsl4X04/ti6I2IaRBAAJ
- https://groups.google.com/d/msg/syzkaller/XwNidsl4X04/ti6I2IaRBAAJ
- https://patchwork.linuxtv.org/patch/44566/
- https://patchwork.linuxtv.org/patch/44566/
- https://patchwork.linuxtv.org/patch/44567/
- https://patchwork.linuxtv.org/patch/44567/
- USN-3631-1
- USN-3631-1
- USN-3631-2
- USN-3631-2
- USN-3754-1
- USN-3754-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
Modified: 2024-11-21
CVE-2017-16643
The parse_hid_report_descriptor function in drivers/input/tablet/gtco.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
- 101769
- 101769
- https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7
- https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7
- https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ
- https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-16644
The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.
Modified: 2024-11-21
CVE-2017-16645
The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
- 101768
- 101768
- https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a
- https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a
- https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ
- https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-16646
drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.
- 101846
- 101846
- https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ
- https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ
- https://patchwork.linuxtv.org/patch/45291/
- https://patchwork.linuxtv.org/patch/45291/
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
Modified: 2024-11-21
CVE-2017-16647
drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
Modified: 2024-11-21
CVE-2017-16648
The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.
Modified: 2024-11-21
CVE-2017-16649
The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.
- 101761
- 101761
- https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
- https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- https://patchwork.ozlabs.org/patch/834771/
- https://patchwork.ozlabs.org/patch/834771/
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3822-1
- USN-3822-1
- USN-3822-2
- USN-3822-2
Modified: 2024-11-21
CVE-2017-16650
The qmi_wwan_bind function in drivers/net/usb/qmi_wwan.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.
- 101791
- 101791
- https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
- https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
- https://patchwork.ozlabs.org/patch/834770/
- https://patchwork.ozlabs.org/patch/834770/
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3754-1
- USN-3754-1
Closed bugs
create static device inodes for SysV init
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Closed bugs
Использовать системную таймзону
Closed bugs
Ошибка сегментации