ALT-BU-2020-3655-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-openssl updated to version 7.2.27-alt1.1 for branch p8 in task 245613.
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-pdo_mysql updated to version 7.2.27-alt1 for branch p8 in task 245613.
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-pgsql updated to version 7.2.27-alt1.2 for branch p8 in task 245613.
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-opcache updated to version 7.2.27-alt1.1 for branch p8 in task 245613.
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-xmlrpc updated to version 7.2.27-alt1 for branch p8 in task 245613.
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14