ALT-PU-2017-1121-1
Package php7-pgsql updated to version 7.1.1-alt1.M80P.1.2 for branch p8 in task 177444.
Closed vulnerabilities
BDU:2017-01601
Уязвимость функции phar_parse_pharfile интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2017-01655
Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
BDU:2017-01662
Уязвимость компонентов каталога Zend/zend_hash.c интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-00024
Уязвимость функции phar_parse_pharfile (ext/phar/phar.c) обработчика архивов PHAR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02548
Уязвимость функции object_common1 интерпретатора языка программирования PHP , связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02549
Уязвимость функции phar_parse_pharfile интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02563
Уязвимость функции exif_convert_any_to_int интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10158
The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- DSA-3783
- DSA-3783
- 95764
- 95764
- 1037659
- 1037659
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73737
- https://bugs.php.net/bug.php?id=73737
- https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
- https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
- GLSA-201702-29
- GLSA-201702-29
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-04
- https://www.tenable.com/security/tns-2017-04
Modified: 2024-11-21
CVE-2016-10159
Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- DSA-3783
- DSA-3783
- 95774
- 95774
- 1037659
- 1037659
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73764
- https://bugs.php.net/bug.php?id=73764
- https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
- https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
- GLSA-201702-29
- GLSA-201702-29
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-04
- https://www.tenable.com/security/tns-2017-04
Modified: 2024-11-21
CVE-2016-10160
Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- DSA-3783
- DSA-3783
- 95783
- 95783
- 1037659
- 1037659
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73768
- https://bugs.php.net/bug.php?id=73768
- https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
- https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be
- GLSA-201702-29
- GLSA-201702-29
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-04
- https://www.tenable.com/security/tns-2017-04
Modified: 2024-11-21
CVE-2016-10161
The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- DSA-3783
- DSA-3783
- 95768
- 95768
- 1037659
- 1037659
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73825
- https://bugs.php.net/bug.php?id=73825
- https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
- https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
- GLSA-201702-29
- GLSA-201702-29
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-04
- https://www.tenable.com/security/tns-2017-04
Modified: 2024-11-21
CVE-2016-10162
The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 95668
- 95668
- 1037659
- 1037659
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73831
- https://bugs.php.net/bug.php?id=73831
- https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
- https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
Modified: 2024-11-21
CVE-2016-7479
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
- http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
- http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7
- http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
- http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf
- 95151
- 95151
- 1037659
- 1037659
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73092
- https://bugs.php.net/bug.php?id=73092
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.youtube.com/watch?v=LDcaPstAuPk
- https://www.youtube.com/watch?v=LDcaPstAuPk
Modified: 2024-11-21
CVE-2017-11147
In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://openwall.com/lists/oss-security/2017/07/10/6
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 99607
- 99607
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73773
- https://bugs.php.net/bug.php?id=73773
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.tenable.com/security/tns-2017-12
- https://www.tenable.com/security/tns-2017-12
Modified: 2024-11-21
CVE-2017-5340
Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.
- 95371
- 95371
- 1037659
- 1037659
- RHSA-2018:1296
- RHSA-2018:1296
- https://bugs.php.net/bug.php?id=73832
- https://bugs.php.net/bug.php?id=73832
- https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12
- https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/