ALT-PU-2018-2460-1
Closed vulnerabilities
BDU:2017-01838
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01839
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01840
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая нарушителю осуществить чтение за границами буфера в динамической памяти
BDU:2017-01841
Уязвимость библиотеки Oniguruma, связанная с некорректной обработкой чисел и позволяющая нарушителю вызвать повреждение памяти
BDU:2017-01843
Уязвимость библиотеки Oniguruma, позволяющая нарушителю оказать влияние на доступность информации
BDU:2018-00525
Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01489
Уязвимость функции gdImageCreateFromGifCtx библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01504
Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04233
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
BDU:2019-04234
Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04235
Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2019-04236
Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-04386
Уязвимость на странице ошибки PHAR 404 интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
- 101244
- 101244
- RHSA-2018:1296
- RHSA-2018:1296
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/issues/55
- https://github.com/kkos/oniguruma/issues/55
Modified: 2024-11-21
CVE-2017-9227
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9228
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
Modified: 2024-11-21
CVE-2017-9229
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
Modified: 2024-11-21
CVE-2018-10545
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104022
- 104022
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75605
- https://bugs.php.net/bug.php?id=75605
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76249
- https://bugs.php.net/bug.php?id=76249
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10547
An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76129
- https://bugs.php.net/bug.php?id=76129
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-10548
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76248
- https://bugs.php.net/bug.php?id=76248
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180509 [SECURITY] [DLA 1373-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- USN-3646-2
- USN-3646-2
- DSA-4240
- DSA-4240
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2019-07
- https://www.tenable.com/security/tns-2019-07
Modified: 2024-11-21
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 104019
- 104019
- 1040807
- 1040807
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=76130
- https://bugs.php.net/bug.php?id=76130
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- GLSA-201812-01
- GLSA-201812-01
- https://security.netapp.com/advisory/ntap-20180607-0003/
- https://security.netapp.com/advisory/ntap-20180607-0003/
- USN-3646-1
- USN-3646-1
- DSA-4240
- DSA-4240
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.synology.com/support/security/Synology_SA_18_20
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Modified: 2024-11-21
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75571
- https://bugs.php.net/bug.php?id=75571
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2020-e795f92d79
- GLSA-201903-18
- GLSA-201903-18
- USN-3755-1
- USN-3755-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2018-5712
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 102742
- 102742
- 104020
- 104020
- 1040363
- 1040363
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74782
- https://bugs.php.net/bug.php?id=74782
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- USN-3566-1
- USN-3566-1
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 103204
- 103204
- 1041607
- 1041607
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75981
- https://bugs.php.net/bug.php?id=75981
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1326-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- [debian-lts-announce] 20180626 [SECURITY] [DLA 1397-1] php5 security update
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- DSA-4240
- DSA-4240
- 44846
- 44846
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-03
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
Closed bugs
Использовать системную таймзону
[FR] собирать без pcre jit на e2k