ALT-PU-2019-1105-1
Package php7-opcache updated to version 7.2.14-alt1.1 for branch p8 in task 219433.
Closed vulnerabilities
BDU:2019-01249
Уязвимость функции imap_mail интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01287
Уязвимость функции gdImageColorMatch (gd_color_match.c) графической библиотеки The GD Graphics Library, позволяющая нарушителю инициировать вызовы imagecolormatch
BDU:2019-01552
Уязвимость функции чтения PHAR интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить конфиденциальность и целостность защищаемых данных
BDU:2019-01553
Уязвимость функции чтения PHAR dns_get_record интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01554
Уязвимость в интерпретаторе языка программирования PHP, связанная с чтением за пределами границ буфера динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить конфиденциальность и целостность защищаемых данных
BDU:2019-01555
Уязвимость функции xmlrpc_decode() расширения XMLRPC интерпретатора языка программирования PHP, связана с чтением данных за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01565
Уязвимость функции xml_elem_parse_buf() интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
Modified: 2024-11-21
CVE-2018-19935
ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- 106143
- 106143
- https://bugs.php.net/bug.php?id=77020
- https://bugs.php.net/bug.php?id=77020
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181221-0003/
- https://security.netapp.com/advisory/ntap-20181221-0003/
- DSA-4353
- DSA-4353
Modified: 2024-11-21
CVE-2019-6977
gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
- openSUSE-SU-2019:1148
- openSUSE-SU-2019:1140
- http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 106731
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2019-d7f8995451
- FEDORA-2019-ab7d22a466
- FEDORA-2019-7a06c0e6b4
- GLSA-201903-18
- https://security.netapp.com/advisory/ntap-20190315-0003/
- USN-3900-1
- DSA-4384
- 46677
- openSUSE-SU-2019:1148
- 46677
- DSA-4384
- USN-3900-1
- https://security.netapp.com/advisory/ntap-20190315-0003/
- GLSA-201903-18
- FEDORA-2019-7a06c0e6b4
- FEDORA-2019-ab7d22a466
- FEDORA-2019-d7f8995451
- FEDORA-2020-e795f92d79
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- https://bugs.php.net/bug.php?id=77270
- RHSA-2019:3299
- RHSA-2019:2519
- 106731
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-5.php
- http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
- openSUSE-SU-2019:1140
Modified: 2024-11-21
CVE-2019-9020
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77242
- https://bugs.php.net/bug.php?id=77249
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77249
- https://bugs.php.net/bug.php?id=77242
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9021
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 106747
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77247
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77247
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- 106747
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9022
An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77369
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3922-2
- USN-3922-3
- DSA-4398
- https://www.tenable.com/security/tns-2019-07
- openSUSE-SU-2019:1572
- https://www.tenable.com/security/tns-2019-07
- DSA-4398
- USN-3922-3
- USN-3922-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77369
- RHSA-2019:3299
- RHSA-2019:2519
- openSUSE-SU-2019:1573
Modified: 2024-11-21
CVE-2019-9023
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77370
- https://bugs.php.net/bug.php?id=77371
- https://bugs.php.net/bug.php?id=77381
- https://bugs.php.net/bug.php?id=77382
- https://bugs.php.net/bug.php?id=77385
- https://bugs.php.net/bug.php?id=77394
- https://bugs.php.net/bug.php?id=77418
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://support.f5.com/csp/article/K06372014
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://support.f5.com/csp/article/K06372014
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77418
- https://bugs.php.net/bug.php?id=77394
- https://bugs.php.net/bug.php?id=77385
- https://bugs.php.net/bug.php?id=77382
- https://bugs.php.net/bug.php?id=77381
- https://bugs.php.net/bug.php?id=77371
- https://bugs.php.net/bug.php?id=77370
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9024
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77380
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77380
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293