ALT-PU-2020-1586-1
Package php7-pdo_mysql updated to version 7.2.29-alt1 for branch c8.1 in task 248390.
Closed vulnerabilities
BDU:2020-00013
Уязвимость компонента sapi/fpm/fpm/fpm_main.c расширения PHP-FPM интерпретатора языка программирования PHP, позволяющая нарушителю выполнять произвольные команды
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01280
Уязвимость функции exif_read_data интерпретатора языка программирования PHP,связанная с чтение за границами буфера памяти, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-02386
Уязвимость реализации функции exif_read_data() интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-02387
Уязвимость реализации функции get_headers() интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2021-00097
Уязвимость интерпретатора языка программирования PHP, связанная с неправильным сохранением разрешений, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-00098
Уязвимость интерпретатора языка программирования PHP, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11043
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
- openSUSE-SU-2019:2441
- openSUSE-SU-2019:2441
- openSUSE-SU-2019:2457
- openSUSE-SU-2019:2457
- http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html
- 20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- 20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- RHSA-2019:3286
- RHSA-2019:3286
- RHSA-2019:3287
- RHSA-2019:3287
- RHSA-2019:3299
- RHSA-2019:3299
- RHSA-2019:3300
- RHSA-2019:3300
- RHSA-2019:3724
- RHSA-2019:3724
- RHSA-2019:3735
- RHSA-2019:3735
- RHSA-2019:3736
- RHSA-2019:3736
- RHSA-2020:0322
- RHSA-2020:0322
- https://bugs.php.net/bug.php?id=78599
- https://bugs.php.net/bug.php?id=78599
- https://github.com/neex/phuip-fpizdam
- https://github.com/neex/phuip-fpizdam
- FEDORA-2019-187ae3128d
- FEDORA-2019-187ae3128d
- FEDORA-2019-7bb07c3b02
- FEDORA-2019-7bb07c3b02
- FEDORA-2019-4adc49a476
- FEDORA-2019-4adc49a476
- 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- https://security.netapp.com/advisory/ntap-20191031-0003/
- https://security.netapp.com/advisory/ntap-20191031-0003/
- https://support.apple.com/kb/HT210919
- https://support.apple.com/kb/HT210919
- https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K75408500?utm_source=f5support&%3Butm_medium=RSS
- USN-4166-1
- USN-4166-1
- USN-4166-2
- USN-4166-2
- DSA-4552
- DSA-4552
- DSA-4553
- DSA-4553
- https://www.synology.com/security/advisory/Synology_SA_19_36
- https://www.synology.com/security/advisory/Synology_SA_19_36
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11047
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78910
- https://bugs.php.net/bug.php?id=78910
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7062
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79221
- https://bugs.php.net/bug.php?id=79221
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- GLSA-202003-57
- GLSA-202003-57
- USN-4330-1
- USN-4330-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7063
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79082
- https://bugs.php.net/bug.php?id=79082
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- GLSA-202003-57
- GLSA-202003-57
- USN-4330-1
- USN-4330-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7064
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
- openSUSE-SU-2020:0642
- openSUSE-SU-2020:0642
- https://bugs.php.net/bug.php?id=79282
- https://bugs.php.net/bug.php?id=79282
- [debian-lts-announce] 20200426 [SECURITY] [DLA 2188-1] php5 security update
- [debian-lts-announce] 20200426 [SECURITY] [DLA 2188-1] php5 security update
- https://security.netapp.com/advisory/ntap-20200403-0001/
- https://security.netapp.com/advisory/ntap-20200403-0001/
- USN-4330-1
- USN-4330-1
- USN-4330-2
- USN-4330-2
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7066
In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.
- openSUSE-SU-2020:0642
- openSUSE-SU-2020:0642
- https://bugs.php.net/bug.php?id=79329
- https://bugs.php.net/bug.php?id=79329
- [debian-lts-announce] 20200426 [SECURITY] [DLA 2188-1] php5 security update
- [debian-lts-announce] 20200426 [SECURITY] [DLA 2188-1] php5 security update
- https://security.netapp.com/advisory/ntap-20200403-0001/
- https://security.netapp.com/advisory/ntap-20200403-0001/
- USN-4330-2
- USN-4330-2
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14