ALT-BU-2020-3856-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-openssl updated to version 7.2.31-alt1.1 for branch p8 in task 252632.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-pdo_mysql updated to version 7.2.31-alt1 for branch p8 in task 252632.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-pgsql updated to version 7.2.31-alt1.2 for branch p8 in task 252632.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-opcache updated to version 7.2.31-alt1.1 for branch p8 in task 252632.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-xmlrpc updated to version 7.2.31-alt1 for branch p8 in task 252632.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14