ALT-BU-2020-3860-1
Branch c8.1 update bulletin.
Package firefox-esr updated to version 68.9.0-alt0.M80C.1 for branch c8.1 in task 252703.
Closed vulnerabilities
BDU:2021-00078
Уязвимость веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00094
Уязвимость модуля распаковки веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, связанная с недостатком механизма проверки подлинности данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00099
Уязвимость подписи DSA веб-браузеров программного обеспечения Firefox, Firefox-esr и Thunderbird, связанная с раскрытием информации в результате расхождений, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-02028
Уязвимость компонента SharedWorkerService браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-12399
NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-202007-49
- USN-4421-1
- DSA-4726
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- DSA-4726
- USN-4421-1
- GLSA-202007-49
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
Modified: 2024-11-21
CVE-2020-12405
When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631618
- USN-4421-1
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631618
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- USN-4421-1
Modified: 2024-11-21
CVE-2020-12406
Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1639590
- USN-4421-1
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1639590
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- USN-4421-1
Modified: 2024-11-21
CVE-2020-12410
Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1619305%2C1632717
- USN-4421-1
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1619305%2C1632717
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- USN-4421-1
Closed bugs
Добавить название дистрибутива в строку User-Agent браузера
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-openssl updated to version 7.2.31-alt1.1 for branch c8.1 in task 252633.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-pdo_mysql updated to version 7.2.31-alt1 for branch c8.1 in task 252633.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-pgsql updated to version 7.2.31-alt1.2 for branch c8.1 in task 252633.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-opcache updated to version 7.2.31-alt1.1 for branch c8.1 in task 252633.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package php7-xmlrpc updated to version 7.2.31-alt1 for branch c8.1 in task 252633.
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14