ALT-BU-2018-3259-1
Branch p8 update bulletin.
Closed bugs
libGLES-devel: missing GLESv3 headers
Package thunderbird updated to version 52.8.0-alt0.M80P.1 for branch p8 in task 206669.
Closed vulnerabilities
BDU:2018-01426
Уязвимость браузера Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-03308
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03309
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03312
Уязвимость библиотеки Skia браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2019-03416
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-03510
Уязвимость компонента baseURI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации
BDU:2021-04136
Уязвимость реализации протокола S/MIME почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-04137
Уязвимость почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04138
Уязвимость почтового клиента Thunderbird, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-04139
Уязвимость почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю отобразить произвольное имя вложения
BDU:2021-04140
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти во время преобразования строки UTF-8 в Unicode, позволяющая нарушителю выполнить произвольный код
BDU:2021-04141
Уязвимость почтового клиента Thunderbird, связанная с непринятием мер по шифрованию защищаемых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-5150
Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- USN-3688-1
- USN-3688-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5154
A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5155
A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5159
An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- 44759
- 44759
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5161
Crafted message headers can cause a Thunderbird process to hang on receiving the message. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411720
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411720
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5162
Plaintext of decrypted emails can leak through the src attribute of remote images, or links. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 104240
- 104240
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1457721
- https://bugzilla.mozilla.org/show_bug.cgi?id=1457721
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5168
Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5170
It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411732
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411732
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5178
A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5183
Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5184
Using remote content in encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 104240
- 104240
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411592
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411592
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5185
Plaintext of decrypted emails can leak through by user submitting an embedded form. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 104240
- 104240
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1450345
- https://bugzilla.mozilla.org/show_bug.cgi?id=1450345
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Closed vulnerabilities
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Closed bugs
[FR] собирать без pcre jit на e2k