ALT-BU-2018-3256-1
Branch p8 update bulletin.
Package firefox-esr updated to version 52.8.0-alt0.M80P.1 for branch p8 in task 206096.
Closed vulnerabilities
BDU:2018-01426
Уязвимость браузера Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-03308
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03309
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03310
Уязвимость компонента PDF Viewer браузеров Firefox ESR и Firefox, позволяющая нарушителю повысить свои привилегии
BDU:2019-03311
Уязвимость компонента PDF Viewer браузеров Firefox ESR и Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2019-03312
Уязвимость библиотеки Skia браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2019-03416
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-03510
Уязвимость компонента baseURI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации
BDU:2021-04140
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти во время преобразования строки UTF-8 в Unicode, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-5150
Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- USN-3688-1
- USN-3688-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5154
A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5155
A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5157
Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449898
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449898
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- GLSA-201810-01
- GLSA-201810-01
- USN-3645-1
- USN-3645-1
- DSA-4199
- DSA-4199
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
Modified: 2024-11-21
CVE-2018-5158
The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452075
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452075
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- GLSA-201810-01
- GLSA-201810-01
- USN-3645-1
- USN-3645-1
- DSA-4199
- DSA-4199
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
Modified: 2024-11-21
CVE-2018-5159
An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- 44759
- 44759
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5168
Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5178
A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5183
Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Closed vulnerabilities
BDU:2016-01470
Уязвимость библиотеки парсинга Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-01683
Уязвимость библиотеки Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-00112
Уязвимость функции entityValueInitProcessor библиотеки для анализа XML-файлов libexpat, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03140
Уязвимость алгоритмов шифрования DES и Triple DES, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2015-1283
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- openSUSE-SU-2015:1287
- openSUSE-SU-2015:1287
- openSUSE-SU-2016:1441
- openSUSE-SU-2016:1441
- SUSE-SU-2016:1508
- SUSE-SU-2016:1508
- SUSE-SU-2016:1512
- SUSE-SU-2016:1512
- openSUSE-SU-2016:1523
- openSUSE-SU-2016:1523
- RHSA-2015:1499
- RHSA-2015:1499
- DSA-3315
- DSA-3315
- DSA-3318
- DSA-3318
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 75973
- 75973
- 1033031
- 1033031
- USN-2726-1
- USN-2726-1
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://codereview.chromium.org/1224303003
- https://codereview.chromium.org/1224303003
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- GLSA-201603-09
- GLSA-201603-09
- GLSA-201701-21
- GLSA-201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-20
Modified: 2024-11-21
CVE-2016-0718
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- openSUSE-SU-2016:1441
- openSUSE-SU-2016:1441
- SUSE-SU-2016:1508
- SUSE-SU-2016:1508
- SUSE-SU-2016:1512
- SUSE-SU-2016:1512
- openSUSE-SU-2016:1523
- openSUSE-SU-2016:1523
- openSUSE-SU-2016:1964
- openSUSE-SU-2016:1964
- openSUSE-SU-2016:2026
- openSUSE-SU-2016:2026
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- RHSA-2016:2824
- RHSA-2016:2824
- 20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6
- 20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6
- http://support.eset.com/ca6333/
- http://support.eset.com/ca6333/
- DSA-3582
- DSA-3582
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- [oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input
- [oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 90729
- 90729
- 1036348
- 1036348
- 1036415
- 1036415
- 1037705
- 1037705
- USN-2983-1
- USN-2983-1
- USN-3044-1
- USN-3044-1
- RHSA-2018:2486
- RHSA-2018:2486
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- GLSA-201701-21
- GLSA-201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://source.android.com/security/bulletin/2016-11-01.html
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-20
Modified: 2024-11-21
CVE-2016-0772
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2016:1626
- RHSA-2016:1626
- RHSA-2016:1627
- RHSA-2016:1627
- RHSA-2016:1628
- RHSA-2016:1628
- RHSA-2016:1629
- RHSA-2016:1629
- RHSA-2016:1630
- RHSA-2016:1630
- [oss-security] 20160614 Python CVE-2016-0772: smtplib StartTLS stripping attack
- [oss-security] 20160614 Python CVE-2016-0772: smtplib StartTLS stripping attack
- 91225
- 91225
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.splunk.com/view/SP-CAAAPUE
- https://bugzilla.redhat.com/show_bug.cgi?id=1303647
- https://bugzilla.redhat.com/show_bug.cgi?id=1303647
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- https://hg.python.org/cpython/rev/b3ce713fb9be
- https://hg.python.org/cpython/rev/b3ce713fb9be
- https://hg.python.org/cpython/rev/d590114c2394
- https://hg.python.org/cpython/rev/d590114c2394
- [debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
- [debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
- GLSA-201701-18
- GLSA-201701-18
Modified: 2024-11-21
CVE-2016-1000110
The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
- https://security-tracker.debian.org/tracker/CVE-2016-1000110
- https://security-tracker.debian.org/tracker/CVE-2016-1000110
Modified: 2025-03-31
CVE-2016-2183
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- SUSE-SU-2016:2387
- SUSE-SU-2016:2387
- openSUSE-SU-2016:2391
- openSUSE-SU-2016:2391
- SUSE-SU-2016:2394
- SUSE-SU-2016:2394
- openSUSE-SU-2016:2407
- openSUSE-SU-2016:2407
- SUSE-SU-2016:2458
- SUSE-SU-2016:2458
- SUSE-SU-2016:2468
- SUSE-SU-2016:2468
- SUSE-SU-2016:2469
- SUSE-SU-2016:2469
- SUSE-SU-2016:2470
- SUSE-SU-2016:2470
- openSUSE-SU-2016:2496
- openSUSE-SU-2016:2496
- openSUSE-SU-2016:2537
- openSUSE-SU-2016:2537
- SUSE-SU-2017:0346
- SUSE-SU-2017:0346
- openSUSE-SU-2017:0374
- openSUSE-SU-2017:0374
- SUSE-SU-2017:0460
- SUSE-SU-2017:0460
- SUSE-SU-2017:0490
- SUSE-SU-2017:0490
- openSUSE-SU-2017:0513
- openSUSE-SU-2017:0513
- SUSE-SU-2017:1444
- SUSE-SU-2017:1444
- SUSE-SU-2017:2699
- SUSE-SU-2017:2699
- SUSE-SU-2017:2700
- SUSE-SU-2017:2700
- openSUSE-SU-2018:0458
- openSUSE-SU-2018:0458
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- RHSA-2017:0336
- RHSA-2017:0336
- RHSA-2017:0337
- RHSA-2017:0337
- RHSA-2017:0338
- RHSA-2017:0338
- RHSA-2017:0462
- RHSA-2017:0462
- 20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
- 20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- 20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities
- 20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities
- 20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities
- 20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities
- DSA-3673
- DSA-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information
- 20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information
- 20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
- 20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
- 20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information
- 20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information
- 20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information
- 20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information
- 20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information
- 20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information
- 20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information
- 20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information
- 20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
- 20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
- 20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information
- 20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information
- 20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information
- 20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information
- 92630
- 92630
- 95568
- 95568
- 1036696
- 1036696
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.splunk.com/view/SP-CAAAPUE
- USN-3087-1
- USN-3087-1
- USN-3087-2
- USN-3087-2
- USN-3179-1
- USN-3179-1
- USN-3194-1
- USN-3194-1
- USN-3198-1
- USN-3198-1
- USN-3270-1
- USN-3270-1
- USN-3372-1
- USN-3372-1
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- https://access.redhat.com/articles/2548661
- https://access.redhat.com/articles/2548661
- RHSA-2017:1216
- RHSA-2017:1216
- RHSA-2017:2708
- RHSA-2017:2708
- RHSA-2017:2709
- RHSA-2017:2709
- RHSA-2017:2710
- RHSA-2017:2710
- RHSA-2017:3113
- RHSA-2017:3113
- RHSA-2017:3114
- RHSA-2017:3114
- RHSA-2017:3239
- RHSA-2017:3239
- RHSA-2017:3240
- RHSA-2017:3240
- RHSA-2018:2123
- RHSA-2018:2123
- RHSA-2019:1245
- RHSA-2019:1245
- RHSA-2019:2859
- RHSA-2019:2859
- RHSA-2020:0451
- RHSA-2020:0451
- https://access.redhat.com/security/cve/cve-2016-2183
- https://access.redhat.com/security/cve/cve-2016-2183
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://bto.bluecoat.com/security-advisory/sa133
- https://bto.bluecoat.com/security-advisory/sa133
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- 20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information
- 20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information
- GLSA-201612-16
- GLSA-201612-16
- GLSA-201701-65
- GLSA-201701-65
- GLSA-201707-01
- GLSA-201707-01
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- https://support.f5.com/csp/article/K13167034
- https://support.f5.com/csp/article/K13167034
- https://sweet32.info/
- https://sweet32.info/
- https://wiki.opendaylight.org/view/Security_Advisories
- https://wiki.opendaylight.org/view/Security_Advisories
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- 42091
- 42091
- [tls] 20091120 RC4+3DES rekeying - long-lived TLS connections
- [tls] 20091120 RC4+3DES rekeying - long-lived TLS connections
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2017-09
- https://www.tenable.com/security/tns-2017-09
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
Modified: 2024-11-21
CVE-2016-4472
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
- 91528
- 91528
- USN-3013-1
- USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- GLSA-201701-21
- GLSA-201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-20
Modified: 2024-11-21
CVE-2016-5636
Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2016:2586
- RHSA-2016:2586
- [oss-security] 20160615 CVE Request: heap overflow in Python zipimport module
- [oss-security] 20160615 CVE Request: heap overflow in Python zipimport module
- [oss-security] 20160616 Re: CVE Request: heap overflow in Python zipimport module
- [oss-security] 20160616 Re: CVE Request: heap overflow in Python zipimport module
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91247
- 91247
- 1038138
- 1038138
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.splunk.com/view/SP-CAAAPUE
- https://bugs.python.org/issue26171
- https://bugs.python.org/issue26171
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- [debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
- [debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
- GLSA-201701-18
- GLSA-201701-18
Modified: 2024-11-21
CVE-2016-9063
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
Modified: 2024-11-21
CVE-2017-9233
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
- DSA-3898
- DSA-3898
- [oss-security] 20170618 Expat 2.2.1 security fixes
- [oss-security] 20170618 Expat 2.2.1 security fixes
- 99276
- 99276
- 1039427
- 1039427
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://libexpat.github.io/doc/cve-2017-9233/
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804
- https://support.f5.com/csp/article/K03244804
Closed bugs
Fatal Python error: getentropy() failed Ошибка сегментирования
Вытягивает python3-test
spoils buildreq results again (while reading the list of available pkgs)
ignore atomic .egg-info files for buildreq (unlike fine-grained .egg-info dirs)
Package postgresql9.6-1C updated to version 9.6.9-alt0.M80P.1 for branch p8 in task 205920.
Closed vulnerabilities
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Package postgresql9.6 updated to version 9.6.9-alt0.M80P.1 for branch p8 in task 205920.
Closed vulnerabilities
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Package postgresql9.5 updated to version 9.5.13-alt0.M80P.1 for branch p8 in task 205920.
Closed vulnerabilities
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Package postgresql9.4 updated to version 9.4.18-alt0.M80P.1 for branch p8 in task 205920.
Closed vulnerabilities
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Package postgresql9.3 updated to version 9.3.23-alt0.M80P.1 for branch p8 in task 205920.
Closed vulnerabilities
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Package postgresql10 updated to version 10.4-alt0.M80P.1 for branch p8 in task 205920.
Closed vulnerabilities
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Package php7-openssl updated to version 7.2.5-alt1.M80P.1.1 for branch p8 in task 205840.
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Package php7-pgsql updated to version 7.2.5-alt1.M80P.1.2 for branch p8 in task 205840.
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Package php7-opcache updated to version 7.2.5-alt1.M80P.1.1 for branch p8 in task 205840.
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Package php7-xmlrpc updated to version 7.2.5-alt1.M80P.1 for branch p8 in task 205840.
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-01418
Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании
BDU:2020-01578
Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-03181
Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-02428
Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02429
Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-19395
ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
Modified: 2024-11-21
CVE-2018-19396
ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2019-11034
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77753
- https://bugs.php.net/bug.php?id=77753
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1501
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:2519
- RHSA-2019:3299
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77831
- https://bugs.php.net/bug.php?id=77831
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1803-1] php5 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- 20190923 [SECURITY] [DSA 4529-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://security.netapp.com/advisory/ntap-20190502-0001/
- https://support.f5.com/csp/article/K44590877
- https://support.f5.com/csp/article/K44590877
- USN-3953-1
- USN-3953-1
- USN-3953-2
- USN-3953-2
- DSA-4529
- DSA-4529
Modified: 2024-11-21
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1503
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=77586
- USN-3922-2
- USN-3922-3
- openSUSE-SU-2019:1293
- USN-3922-3
- USN-3922-2
- https://bugs.php.net/bug.php?id=77586
- http://php.net/ChangeLog-7.php
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1503
Package kernel-image-un-def updated to version 4.14.41-alt0.M80P.1 for branch p8 in task 206459.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1000200
The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper's unmap_page_range() since the vma's VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).
- [oss-security] 20180424 CVE-2018-1000200 (Linux): Bad memory access on oom kill of large mlocked process
- [oss-security] 20180424 CVE-2018-1000200 (Linux): Bad memory access on oom kill of large mlocked process
- 104397
- 104397
- RHSA-2018:2948
- RHSA-2018:2948
- https://access.redhat.com/security/cve/cve-2018-1000200
- https://access.redhat.com/security/cve/cve-2018-1000200
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
- [linux-kernel] 20180417 [patch] mm, oom: fix concurrent munlock and oom reaper unmap
- [linux-kernel] 20180417 [patch] mm, oom: fix concurrent munlock and oom reaper unmap
- [linux-kernel] 20180424 [patch v3 for-4.17] mm, oom: fix concurrent munlock and oom reaper unmap
- [linux-kernel] 20180424 [patch v3 for-4.17] mm, oom: fix concurrent munlock and oom reaper unmap
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3