ALT-BU-2018-3393-1
Branch p8 update bulletin.
Package kernel-image-un-def updated to version 4.14.61-alt0.M80P.1 for branch p8 in task 211124.
Closed vulnerabilities
BDU:2019-01344
Уязвимость функции xen_failsafe_callback гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2018-14678
An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
- 104924
- 1041397
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3931-1
- USN-3931-2
- DSA-4308
- https://xenbits.xen.org/xsa/advisory-274.html
- 104924
- https://xenbits.xen.org/xsa/advisory-274.html
- DSA-4308
- USN-3931-2
- USN-3931-1
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- 1041397
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Package php7-openssl updated to version 7.2.8-alt1.M80P.1.1 for branch p8 in task 210925.
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Package php7-pgsql updated to version 7.2.8-alt1.M80P.1.2 for branch p8 in task 210925.
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Package php7-opcache updated to version 7.2.8-alt1.M80P.1.1 for branch p8 in task 210925.
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Package php7-xmlrpc updated to version 7.2.8-alt1.M80P.1 for branch p8 in task 210925.
Closed vulnerabilities
BDU:2019-01268
Уязвимость модуля exif_process_IFD_in_MAKERNOTE языка программирования PHP, связанная с чтением за пределами границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01269
Уязвимость модуля exif_thumbnail_extract языка программирования PHP, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02426
Уязвимость компонента ext/standard/link_win32.c интерпретатора языка программирования PHP, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2015-9253
An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=70185
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=73342https://github.com/php/php-src/pull/3287
- https://bugs.php.net/bug.php?id=75968
- https://bugs.php.net/bug.php?id=75968
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/blob/PHP-7.1.20/NEWS#L20-L22
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- https://github.com/php/php-src/commit/69dee5c732fe982c82edb17d0dbc3e79a47748d8
- USN-3766-1
- USN-3766-1
- USN-4279-1
- USN-4279-1
- https://www.futureweb.at/security/CVE-2015-9253/
- https://www.futureweb.at/security/CVE-2015-9253/
Modified: 2024-11-21
CVE-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
Modified: 2024-11-21
CVE-2018-14851
exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76557
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76557
- RHSA-2019:2519
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-14883
An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 104871
- https://bugs.php.net/bug.php?id=76423
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181107-0003/
- USN-3766-1
- USN-3766-2
- DSA-4353
- https://www.tenable.com/security/tns-2018-12
- http://php.net/ChangeLog-5.php
- https://www.tenable.com/security/tns-2018-12
- DSA-4353
- USN-3766-2
- USN-3766-1
- https://security.netapp.com/advisory/ntap-20181107-0003/
- [debian-lts-announce] 20180901 [SECURITY] [DLA 1490-1] php5 security update
- https://bugs.php.net/bug.php?id=76423
- 104871
- http://php.net/ChangeLog-7.php
Modified: 2024-11-21
CVE-2018-15132
An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- https://bugs.php.net/bug.php?id=76459
- https://bugs.php.net/bug.php?id=76459
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://security.netapp.com/advisory/ntap-20181107-0003/
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Package adobe-flash-player-ppapi updated to version 30-alt1.M80P.1 for branch p8 in task 211228.
Closed vulnerabilities
BDU:2021-05395
Уязвимость программной платформы Adobe Flash Player, связанная с записью данных за пределами буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-4944
Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4945
Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5000
Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-5001
Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2025-02-13
CVE-2018-5002
Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5007
Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5008
Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Closed bugs
chromium ругается на старый flash