260 lines
19 KiB
XML
260 lines
19 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
|
|
<DocumentTitle xml:lang="en">An update for php is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
|
|
<DocumentType>Security Advisory</DocumentType>
|
|
<DocumentPublisher Type="Vendor">
|
|
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
|
|
<IssuingAuthority>openEuler security committee</IssuingAuthority>
|
|
</DocumentPublisher>
|
|
<DocumentTracking>
|
|
<Identification>
|
|
<ID>openEuler-SA-2022-1556</ID>
|
|
</Identification>
|
|
<Status>Final</Status>
|
|
<Version>1.0</Version>
|
|
<RevisionHistory>
|
|
<Revision>
|
|
<Number>1.0</Number>
|
|
<Date>2022-03-07</Date>
|
|
<Description>Initial</Description>
|
|
</Revision>
|
|
</RevisionHistory>
|
|
<InitialReleaseDate>2022-03-07</InitialReleaseDate>
|
|
<CurrentReleaseDate>2022-03-07</CurrentReleaseDate>
|
|
<Generator>
|
|
<Engine>openEuler SA Tool V1.0</Engine>
|
|
<Date>2022-03-07</Date>
|
|
</Generator>
|
|
</DocumentTracking>
|
|
<DocumentNotes>
|
|
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">php security update</Note>
|
|
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for php is now available for openEuler-20.03-LTS-SP1.</Note>
|
|
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.
|
|
|
|
Security Fix(es):
|
|
|
|
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.(CVE-2020-7067)
|
|
|
|
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.(CVE-2019-11038)
|
|
|
|
Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.(CVE-2019-11039)
|
|
|
|
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.(CVE-2019-11040)</Note>
|
|
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for php is now available for openEuler-20.03-LTS-SP1.
|
|
|
|
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
|
|
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
|
|
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">php</Note>
|
|
</DocumentNotes>
|
|
<DocumentReferences>
|
|
<Reference Type="Self">
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1556</URL>
|
|
</Reference>
|
|
<Reference Type="openEuler CVE">
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2020-7067</URL>
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2019-11038</URL>
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2019-11039</URL>
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2019-11040</URL>
|
|
</Reference>
|
|
<Reference Type="Other">
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-7067</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-11038</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-11039</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-11040</URL>
|
|
</Reference>
|
|
</DocumentReferences>
|
|
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
|
<Branch Type="Product Name" Name="openEuler">
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="aarch64">
|
|
<FullProductName ProductID="php-gmp-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-gmp-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-json-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-json-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-tidy-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-tidy-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-common-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-common-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-intl-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-intl-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-dba-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-dba-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-xml-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-xml-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-embedded-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-embedded-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-cli-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-cli-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-enchant-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-enchant-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-dbg-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-dbg-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-opcache-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-opcache-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-debugsource-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-debugsource-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-ldap-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-ldap-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-fpm-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-fpm-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-gd-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-gd-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-help-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-help-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-mysqlnd-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-mysqlnd-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-bcmath-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-bcmath-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-snmp-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-snmp-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-mbstring-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-mbstring-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-devel-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-devel-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-pgsql-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-pgsql-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-odbc-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-odbc-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-recode-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-recode-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-xmlrpc-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-xmlrpc-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-debuginfo-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-debuginfo-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-soap-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-soap-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-pdo-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-pdo-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-process-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-process-7.2.10-19.oe1.aarch64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="src">
|
|
<FullProductName ProductID="php-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-7.2.10-19.oe1.src.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="x86_64">
|
|
<FullProductName ProductID="php-xmlrpc-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-xmlrpc-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-snmp-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-snmp-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-bcmath-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-bcmath-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-gmp-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-gmp-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-debugsource-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-debugsource-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-opcache-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-opcache-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-enchant-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-enchant-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-fpm-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-fpm-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-dbg-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-dbg-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-help-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-help-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-pdo-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-pdo-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-cli-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-cli-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-soap-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-soap-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-dba-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-dba-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-intl-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-intl-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-debuginfo-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-debuginfo-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-tidy-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-tidy-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-json-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-json-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-ldap-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-ldap-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-recode-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-recode-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-pgsql-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-pgsql-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-gd-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-gd-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-mbstring-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-mbstring-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-xml-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-xml-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-process-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-process-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-odbc-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-odbc-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-devel-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-devel-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-mysqlnd-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-mysqlnd-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-common-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-common-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="php-embedded-7.2.10-19" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">php-embedded-7.2.10-19.oe1.x86_64.rpm</FullProductName>
|
|
</Branch>
|
|
</ProductTree>
|
|
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2022-03-07</ReleaseDate>
|
|
<CVE>CVE-2020-7067</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.5</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>php security update</Description>
|
|
<DATE>2022-03-07</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1556</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2022-03-07</ReleaseDate>
|
|
<CVE>CVE-2019-11038</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Medium</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>5.3</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>php security update</Description>
|
|
<DATE>2022-03-07</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1556</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2022-03-07</ReleaseDate>
|
|
<CVE>CVE-2019-11039</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Critical</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>9.1</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>php security update</Description>
|
|
<DATE>2022-03-07</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1556</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="4" xml:lang="en">When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2022-03-07</ReleaseDate>
|
|
<CVE>CVE-2019-11040</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Critical</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>9.1</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>php security update</Description>
|
|
<DATE>2022-03-07</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1556</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
</cvrfdoc> |