ALT-BU-2018-3205-1
Branch c8.1 update bulletin.
Closed vulnerabilities
BDU:2016-01475
Уязвимость интерпретатора PHP, позволяющая нарушителю провести XXE- и XXL-атаки
BDU:2017-01675
Уязвимость интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании центрального процессора
BDU:2017-01714
Уязвимость функции msgfmt_parse_message интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-01838
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01839
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01840
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая нарушителю осуществить чтение за границами буфера в динамической памяти
BDU:2017-01841
Уязвимость библиотеки Oniguruma, связанная с некорректной обработкой чисел и позволяющая нарушителю вызвать повреждение памяти
BDU:2017-01843
Уязвимость библиотеки Oniguruma, позволяющая нарушителю оказать влияние на доступность информации
BDU:2017-02023
Уязвимость функции finish_nested_data интерпретатора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных
BDU:2017-02024
Уязвимость в ext/standard/var_unserializer.re гипертекстового процессора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных
BDU:2018-00008
Уязвимость функции GIF-декодирования gdImageCreateFromGifCtx (gd_gif_in.c) библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю нарушить конфиденциальность информации
BDU:2018-01489
Уязвимость функции gdImageCreateFromGifCtx библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04386
Уязвимость на странице ошибки PHAR 404 интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2022-02420
Уязвимость компонента ext/standard/var_unserializer.re интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-02421
Уязвимость функции zend_ini_do_op() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код
BDU:2022-02422
Уязвимость функции timelib_meridian() интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
BDU:2022-02424
Уязвимость расширения openssl (ext/openssl/openssl.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02425
Уязвимость функции mysqli_real_escape_string интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие
BDU:2022-02485
Уязвимость функции http_header_value (ext/standard/http_fopen_wrapper.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01643
Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2015-8866
ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- openSUSE-SU-2016:1274
- openSUSE-SU-2016:1274
- SUSE-SU-2016:1277
- SUSE-SU-2016:1277
- openSUSE-SU-2016:1373
- openSUSE-SU-2016:1373
- RHSA-2016:2750
- RHSA-2016:2750
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 87470
- 87470
- USN-2952-1
- USN-2952-1
- USN-2952-2
- USN-2952-2
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.php.net/bug.php?id=64938
- https://bugs.php.net/bug.php?id=64938
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-11142
In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99601
- 99601
- https://bugs.php.net/bug.php?id=73807
- https://bugs.php.net/bug.php?id=73807
- https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3
- https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3
- https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
- https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11144
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=89637c6b41b510c20d262c17483f582f115c66d6
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=89637c6b41b510c20d262c17483f582f115c66d6
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74651
- https://bugs.php.net/bug.php?id=74651
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11145
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e8b7698f5ee757ce2c8bd10a192a491a498f891c
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e8b7698f5ee757ce2c8bd10a192a491a498f891c
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99550
- 99550
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74819
- https://bugs.php.net/bug.php?id=74819
- https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
- https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11362
In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact within International Components for Unicode (ICU) for C/C++ via a long first argument to the msgfmt_parse_message function.
Modified: 2024-11-21
CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
- 99489
- 99489
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74603
- https://bugs.php.net/bug.php?id=74603
- GLSA-201709-21
- GLSA-201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
Modified: 2024-11-21
CVE-2017-12932
ext/standard/var_unserializer.re in PHP 7.0.x through 7.0.22 and 7.1.x through 7.1.8 is prone to a heap use after free while unserializing untrusted data, related to improper use of the hash API for key deletion in a situation with an invalid array size. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 100427
- 100427
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74103
- https://bugs.php.net/bug.php?id=74103
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- GLSA-201709-21
- GLSA-201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
Modified: 2024-11-21
CVE-2017-12933
The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99490
- 99490
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74111
- https://bugs.php.net/bug.php?id=74111
- USN-3566-1
- USN-3566-1
- USN-3566-2
- USN-3566-2
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
Modified: 2024-11-21
CVE-2017-12934
ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x before 7.1.7 is prone to a heap use after free while unserializing untrusted data, related to the zval_get_type function in Zend/zend_types.h. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Modified: 2024-11-21
CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
- 97178
- 97178
- 1038158
- 1038158
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=75505
- https://bugs.php.net/bug.php?id=75505
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
Modified: 2024-11-21
CVE-2017-7890
The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- DSA-3938
- DSA-3938
- 99492
- 99492
- RHSA-2018:0406
- RHSA-2018:0406
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74435
- https://bugs.php.net/bug.php?id=74435
- https://bugs.php.net/patch-display.php?bug=74435&patch=fix-74435-php-7.0&revision=1497970038
- https://bugs.php.net/patch-display.php?bug=74435&patch=fix-74435-php-7.0&revision=1497970038
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-7963
The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
Modified: 2024-11-21
CVE-2017-9120
PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.
Modified: 2024-11-21
CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
- 101244
- 101244
- RHSA-2018:1296
- RHSA-2018:1296
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/issues/55
- https://github.com/kkos/oniguruma/issues/55
Modified: 2024-11-21
CVE-2017-9227
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9228
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
Modified: 2024-11-21
CVE-2017-9229
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
Modified: 2024-11-21
CVE-2018-14884
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
Modified: 2024-11-21
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75571
- https://bugs.php.net/bug.php?id=75571
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2020-e795f92d79
- GLSA-201903-18
- GLSA-201903-18
- USN-3755-1
- USN-3755-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2018-5712
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 102742
- 102742
- 104020
- 104020
- 1040363
- 1040363
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74782
- https://bugs.php.net/bug.php?id=74782
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- USN-3566-1
- USN-3566-1
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Package php7-openssl updated to version 7.1.14-alt1.N.M80C.1.1 for branch c8.1 in task 203446.
Closed vulnerabilities
BDU:2016-01475
Уязвимость интерпретатора PHP, позволяющая нарушителю провести XXE- и XXL-атаки
BDU:2017-01675
Уязвимость интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании центрального процессора
BDU:2017-01714
Уязвимость функции msgfmt_parse_message интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-01838
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01839
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01840
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая нарушителю осуществить чтение за границами буфера в динамической памяти
BDU:2017-01841
Уязвимость библиотеки Oniguruma, связанная с некорректной обработкой чисел и позволяющая нарушителю вызвать повреждение памяти
BDU:2017-01843
Уязвимость библиотеки Oniguruma, позволяющая нарушителю оказать влияние на доступность информации
BDU:2017-02023
Уязвимость функции finish_nested_data интерпретатора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных
BDU:2017-02024
Уязвимость в ext/standard/var_unserializer.re гипертекстового процессора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных
BDU:2018-00008
Уязвимость функции GIF-декодирования gdImageCreateFromGifCtx (gd_gif_in.c) библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю нарушить конфиденциальность информации
BDU:2018-01489
Уязвимость функции gdImageCreateFromGifCtx библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04386
Уязвимость на странице ошибки PHAR 404 интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2022-02420
Уязвимость компонента ext/standard/var_unserializer.re интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-02421
Уязвимость функции zend_ini_do_op() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код
BDU:2022-02422
Уязвимость функции timelib_meridian() интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
BDU:2022-02424
Уязвимость расширения openssl (ext/openssl/openssl.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02425
Уязвимость функции mysqli_real_escape_string интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие
BDU:2022-02485
Уязвимость функции http_header_value (ext/standard/http_fopen_wrapper.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01643
Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2015-8866
ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- openSUSE-SU-2016:1274
- openSUSE-SU-2016:1274
- SUSE-SU-2016:1277
- SUSE-SU-2016:1277
- openSUSE-SU-2016:1373
- openSUSE-SU-2016:1373
- RHSA-2016:2750
- RHSA-2016:2750
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 87470
- 87470
- USN-2952-1
- USN-2952-1
- USN-2952-2
- USN-2952-2
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.php.net/bug.php?id=64938
- https://bugs.php.net/bug.php?id=64938
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-11142
In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99601
- 99601
- https://bugs.php.net/bug.php?id=73807
- https://bugs.php.net/bug.php?id=73807
- https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3
- https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3
- https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
- https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11144
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=89637c6b41b510c20d262c17483f582f115c66d6
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=89637c6b41b510c20d262c17483f582f115c66d6
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74651
- https://bugs.php.net/bug.php?id=74651
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11145
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e8b7698f5ee757ce2c8bd10a192a491a498f891c
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e8b7698f5ee757ce2c8bd10a192a491a498f891c
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99550
- 99550
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74819
- https://bugs.php.net/bug.php?id=74819
- https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
- https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11362
In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact within International Components for Unicode (ICU) for C/C++ via a long first argument to the msgfmt_parse_message function.
Modified: 2024-11-21
CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
- 99489
- 99489
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74603
- https://bugs.php.net/bug.php?id=74603
- GLSA-201709-21
- GLSA-201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
Modified: 2024-11-21
CVE-2017-12932
ext/standard/var_unserializer.re in PHP 7.0.x through 7.0.22 and 7.1.x through 7.1.8 is prone to a heap use after free while unserializing untrusted data, related to improper use of the hash API for key deletion in a situation with an invalid array size. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 100427
- 100427
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74103
- https://bugs.php.net/bug.php?id=74103
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- GLSA-201709-21
- GLSA-201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
Modified: 2024-11-21
CVE-2017-12933
The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99490
- 99490
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74111
- https://bugs.php.net/bug.php?id=74111
- USN-3566-1
- USN-3566-1
- USN-3566-2
- USN-3566-2
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
Modified: 2024-11-21
CVE-2017-12934
ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x before 7.1.7 is prone to a heap use after free while unserializing untrusted data, related to the zval_get_type function in Zend/zend_types.h. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Modified: 2024-11-21
CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
- 97178
- 97178
- 1038158
- 1038158
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=75505
- https://bugs.php.net/bug.php?id=75505
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
Modified: 2024-11-21
CVE-2017-7890
The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- DSA-3938
- DSA-3938
- 99492
- 99492
- RHSA-2018:0406
- RHSA-2018:0406
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74435
- https://bugs.php.net/bug.php?id=74435
- https://bugs.php.net/patch-display.php?bug=74435&patch=fix-74435-php-7.0&revision=1497970038
- https://bugs.php.net/patch-display.php?bug=74435&patch=fix-74435-php-7.0&revision=1497970038
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-7963
The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
Modified: 2024-11-21
CVE-2017-9120
PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.
Modified: 2024-11-21
CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
- 101244
- 101244
- RHSA-2018:1296
- RHSA-2018:1296
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/issues/55
- https://github.com/kkos/oniguruma/issues/55
Modified: 2024-11-21
CVE-2017-9227
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9228
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
Modified: 2024-11-21
CVE-2017-9229
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
Modified: 2024-11-21
CVE-2018-14884
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
Modified: 2024-11-21
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75571
- https://bugs.php.net/bug.php?id=75571
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2020-e795f92d79
- GLSA-201903-18
- GLSA-201903-18
- USN-3755-1
- USN-3755-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2018-5712
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 102742
- 102742
- 104020
- 104020
- 1040363
- 1040363
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74782
- https://bugs.php.net/bug.php?id=74782
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- USN-3566-1
- USN-3566-1
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Package php7-pgsql updated to version 7.1.14-alt1.N.M80C.1.2 for branch c8.1 in task 203446.
Closed vulnerabilities
BDU:2016-01475
Уязвимость интерпретатора PHP, позволяющая нарушителю провести XXE- и XXL-атаки
BDU:2017-01675
Уязвимость интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании центрального процессора
BDU:2017-01714
Уязвимость функции msgfmt_parse_message интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-01838
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01839
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01840
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая нарушителю осуществить чтение за границами буфера в динамической памяти
BDU:2017-01841
Уязвимость библиотеки Oniguruma, связанная с некорректной обработкой чисел и позволяющая нарушителю вызвать повреждение памяти
BDU:2017-01843
Уязвимость библиотеки Oniguruma, позволяющая нарушителю оказать влияние на доступность информации
BDU:2017-02023
Уязвимость функции finish_nested_data интерпретатора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных
BDU:2017-02024
Уязвимость в ext/standard/var_unserializer.re гипертекстового процессора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных
BDU:2018-00008
Уязвимость функции GIF-декодирования gdImageCreateFromGifCtx (gd_gif_in.c) библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю нарушить конфиденциальность информации
BDU:2018-01489
Уязвимость функции gdImageCreateFromGifCtx библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04386
Уязвимость на странице ошибки PHAR 404 интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2022-02420
Уязвимость компонента ext/standard/var_unserializer.re интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-02421
Уязвимость функции zend_ini_do_op() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код
BDU:2022-02422
Уязвимость функции timelib_meridian() интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
BDU:2022-02423
Уязвимость компонента ext/date/lib/parse_date.c интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации
BDU:2022-02424
Уязвимость расширения openssl (ext/openssl/openssl.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02425
Уязвимость функции mysqli_real_escape_string интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие
BDU:2022-02485
Уязвимость функции http_header_value (ext/standard/http_fopen_wrapper.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01643
Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2015-8866
ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- openSUSE-SU-2016:1274
- openSUSE-SU-2016:1274
- SUSE-SU-2016:1277
- SUSE-SU-2016:1277
- openSUSE-SU-2016:1373
- openSUSE-SU-2016:1373
- RHSA-2016:2750
- RHSA-2016:2750
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 87470
- 87470
- USN-2952-1
- USN-2952-1
- USN-2952-2
- USN-2952-2
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.php.net/bug.php?id=64938
- https://bugs.php.net/bug.php?id=64938
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-11142
In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99601
- 99601
- https://bugs.php.net/bug.php?id=73807
- https://bugs.php.net/bug.php?id=73807
- https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3
- https://github.com/php/php-src/commit/0f8cf3b8497dc45c010c44ed9e96518e11e19fc3
- https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
- https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11144
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=73cabfedf519298e1a11192699f44d53c529315e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=89637c6b41b510c20d262c17483f582f115c66d6
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=89637c6b41b510c20d262c17483f582f115c66d6
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91826a311dd37f4c4e5d605fa7af331e80ddd4c3
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74651
- https://bugs.php.net/bug.php?id=74651
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11145
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e8b7698f5ee757ce2c8bd10a192a491a498f891c
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e8b7698f5ee757ce2c8bd10a192a491a498f891c
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99550
- 99550
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74819
- https://bugs.php.net/bug.php?id=74819
- https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
- https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-11362
In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact within International Components for Unicode (ICU) for C/C++ via a long first argument to the msgfmt_parse_message function.
Modified: 2024-11-21
CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=05255749139b3686c8a6a58ee01131ac0047465e
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=5f8380d33e648964d2d5140f329cf2d4c443033c
- 99489
- 99489
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74603
- https://bugs.php.net/bug.php?id=74603
- GLSA-201709-21
- GLSA-201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
Modified: 2024-11-21
CVE-2017-12932
ext/standard/var_unserializer.re in PHP 7.0.x through 7.0.22 and 7.1.x through 7.1.8 is prone to a heap use after free while unserializing untrusted data, related to improper use of the hash API for key deletion in a situation with an invalid array size. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 100427
- 100427
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74103
- https://bugs.php.net/bug.php?id=74103
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- https://github.com/php/php-src/commit/1a23ebc1fff59bf480ca92963b36eba5c1b904c4
- GLSA-201709-21
- GLSA-201709-21
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- DSA-4080
- DSA-4080
Modified: 2024-11-21
CVE-2017-12933
The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99490
- 99490
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74111
- https://bugs.php.net/bug.php?id=74111
- USN-3566-1
- USN-3566-1
- USN-3566-2
- USN-3566-2
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
Modified: 2024-11-21
CVE-2017-12934
ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x before 7.1.7 is prone to a heap use after free while unserializing untrusted data, related to the zval_get_type function in Zend/zend_types.h. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
Modified: 2024-11-21
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 101745
- 101745
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75055
- https://bugs.php.net/bug.php?id=75055
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/derickr/timelib/commit/aa9156006e88565e1f1a5f7cc088b18322d57536
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
- https://security.netapp.com/advisory/ntap-20181123-0001/
- https://security.netapp.com/advisory/ntap-20181123-0001/
- USN-3566-1
- USN-3566-1
- DSA-4080
- DSA-4080
- DSA-4081
- DSA-4081
- 43133
- 43133
Modified: 2024-11-21
CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
- 97178
- 97178
- 1038158
- 1038158
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=75505
- https://bugs.php.net/bug.php?id=75505
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
Modified: 2024-11-21
CVE-2017-7890
The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- DSA-3938
- DSA-3938
- 99492
- 99492
- RHSA-2018:0406
- RHSA-2018:0406
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=74435
- https://bugs.php.net/bug.php?id=74435
- https://bugs.php.net/patch-display.php?bug=74435&patch=fix-74435-php-7.0&revision=1497970038
- https://bugs.php.net/patch-display.php?bug=74435&patch=fix-74435-php-7.0&revision=1497970038
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-7963
The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
Modified: 2024-11-21
CVE-2017-9120
PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.
Modified: 2024-11-21
CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
- 101244
- 101244
- RHSA-2018:1296
- RHSA-2018:1296
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/issues/55
- https://github.com/kkos/oniguruma/issues/55
Modified: 2024-11-21
CVE-2017-9227
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9228
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
Modified: 2024-11-21
CVE-2017-9229
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
Modified: 2024-11-21
CVE-2018-14884
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
Modified: 2024-11-21
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75571
- https://bugs.php.net/bug.php?id=75571
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2020-e795f92d79
- GLSA-201903-18
- GLSA-201903-18
- USN-3755-1
- USN-3755-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2018-5712
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 102742
- 102742
- 104020
- 104020
- 1040363
- 1040363
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74782
- https://bugs.php.net/bug.php?id=74782
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- USN-3566-1
- USN-3566-1
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html