[CLSA-2022:1659556726] Fix of 99 CVEs
Type:
security
Severity:
Critical
Release date:
2022-08-03
Description:
- Fix #79971: special character is breaking the path in xml function (CVE-2021-21707) - Fix bug #80672: Null Dereference in SoapClient. (CVE-2021-21702) - Fix bug #79699: PHP parses encoded cookie names so malicious `__Host-` cookies can be sent (CVE-2020-7070) - Fix bug #78875: Long variables cause OOM and temp files are not cleaned. (CVE-2019-11048) - Fix bug #78876: Long variables in multipart/form-data cause OOM and temp files are not cleaned. (CVE-2019-11048) - Fix bug #79465: OOB Read in urldecode() (CVE-2020-7067) - Fix bug #79282: Use-of-uninitialized-value in exif (CVE-2020-7064) - Fix bug #79329: get_headers silently truncates after a null byte (CVE-2020-7066) - Fix bug #79099: OOB read in php_strip_tags_ex (CVE-2020-7059) - Fixed bug #78878 (Buffer underflow in bc_shift_addsub). (CVE-2019-11046) - Fixed bug #78910 (Heap-buffer-overflow READ in exif). (CVE-2019-11047) - Fixed CVE-2019-13224 - Fix for bug 76129 (CVE-2018-10547) Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file - CVE-2017-11143: wddx parsing empty boolean tag leads to SIGSEGV - CVE-2017-11144: negative-size-param (-1) in memcpy in zif_openssl_seal() - CVE-2017-11145: wddx_deserialize() heap out-of-bound read via php_parse_date() - CVE-2017-11146: wddx_deserialize() heap out-of-bound read via php_parse_date() (caused by CVE-2017-11145) - CVE-2017-7890: Buffer over-read into uninitialized memory - CVE-2017-9224: Buffer Overflow in match_at() (Oniguruma issue) - CVE-2017-9226: Heap corruption in next_state_val() in 15 encodings (Oniguruma issue) - CVE-2017-9227: Bug in mbc_enc_len() (Oniguruma issue) - CVE-2017-9228: Heap corruption in next_state_val() due to uninitialized local variable (Oniguruma issue) - CVE-2017-9229: SIGSEGV in left_adjust_char_head() due to bad dereference (Oniguruma issue) - Added check that soap.wsdl_cache_dir conforms to open_basedir (CVE-2013-1635) - bug 70081: SoapClient info leak / null pointer dereference via multiple type confusions (CVE-2015-8835) - Improve check for :memory: pseudo-filename in SQlite (CVE-2012-3365) - bug 72627: Memory Leakage In exif_process_IFD_in_TIFF (CVE-2016-7128) - bug 73825: Heap out of bounds read on unserialize in finish_nested_data() (CVE-2016-10161) - bug 73737: FPE when parsing a tag format (CVE-2016-10158) - CVE-2012-2688: Integer Overflow issues in _php_stream_scandir - CVE-2016-7418: Out-Of-Bounds Read in php_wddx_push_element of wddx.c - CVE-2016-5399: Inadequate error handling in bzread() - CVE-2016-6288: php_url_parse_ex() buffer overflow read - CVE-2016-6289: Stack-based buffer overflow vulnerability in virtual_file_ex - CVE-2016-6290: Use After Free in unserialize() with Unexpected Session Deserialization - CVE-2016-6296: heap-buffer-overflow (write) simplestring_addn simplestring.c - CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow - CVE-2016-5772: Double Free Corruption in wddx_deserialize - CVE-2015-8874: Stack overflow with imagefilltoborder - CVE-2015-6835: Use after free vulnerability in session deserializer - CVE-2016-5094: (core) integer overflow in php_html_entities - security bug 71912: libgd: signedness vulnerability (CVE-2016-3074) - security bug 72094: Out of bounds heap read access in exif header processing (CVE-2016-4542, CVE-2016-4543, CVE-2016-4544) - security bug 72093: bcpowmod accepts negative scale and corrupts _one_ definition (CVE-2016-4537, CVE-2016-4538) - improve php-5.1.6-CVE-2010-2191.patch (ALTPHP-84) - Add patches for CVEs: CVE-2015-6836, CVE-2015-6837, CVE-2015-6838 - fix patches: CVE-2012-0830, CVE-2015-4025, CVE-2015-4026 - Fix bug #78875: Long variables cause OOM and temp files are not cleaned (CVE-2019-11048) - Fix bug #78876: Long variables in multipart/form-data cause OOM and temp files are not cleaned (CVE-2019-11048) - Fix bug #79082: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063) - bug 70350: ZipArchive::extractTo allows for directory traversal when creating directories (CVE-2014-9767) - Disabled external entities loading (CVE-2013-1643, CVE-2013-1824) - bug 73764: Crash while loading hostile phar archive (CVE-2016-10159) - bug 73768: Memory corruption when loading hostile phar (CVE-2016-10160) - CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf - CVE-2016-7413: wddx_deserialize use-after-free - CVE-2016-7414: Out of bound when verify signature of zip phar in phar_parse_zipfile - CVE-2016-7416: SEH buffer overflow msgfmt_format_message - CVE-2016-6291: Out of bound read in exif_process_IFD_in_MAKERNOTE - CVE-2016-6294: locale_accept_from_http out-of-bounds access - CVE-2015-8879: PHP segfaults when accessing nvarchar(max) defined columns - CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener - CVE-2016-4343: (phar) uninitialized pointer in phar_make_dirstream() - CVE-2016-5093: (intl) get_icu_value_internal out-of-bounds read - CVE-2016-5096: (core) integer underflow / arbitrary null write in fread/gzread - security bug 72099: xml_parse_into_struct segmentation fault (CVE-2016-4539) - security bug 72061: Out-of-bounds reads in zif_grapheme_stripos with negative offset (CVE-2016-4540, CVE-2016-4541) - security bug CVE-2015-5590: Buffer overflow and stack smashing error in phar_fix_filepath - Add patches for CVEs: CVE-2015-6833, CVE-2015-6836, CVE-2015-6837, CVE-2015-6838 - add paches for CVE-2013-4248 and CVE-2013-6420 - CVE-2021-21703: fix error in php fpm shared memory organization leading to privilage escalation - CVE-2021-21707: fix handling of paths with percent encoded NULL byte - Fixed bug #78863 (DirectoryIterator class silently truncates after a nullbyte). (CVE-2019-11045) - Fix bug #78599 (env_path_info underflow can lead to RCE) (CVE-2019-11043) - ALTPHP-451: Fix for CVE-2016-7478 Unserialize Exception object can lead to infinite loop - bug 72455 Heap Overflow due to integer overflows (CVE-2016-5769) - CVE-2016-5773: ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize - bug 70014: openssl_random_pseudo_bytes() is not cryptographically secure (CVE-2015-8867) - bug 70121: unserialize() could lead to unexpected methods execution / NULL pointer deref (CVE-2015-8876) - bug 71906: AddressSanitizer: negative-size-param (-1) in mbfl_strcut (CVE-2016-4073) - CVE-2016-7417: Missing type check when unserializing SplArray - add patch for CVE-2011-4885 - fix patch for CVE-2012-0830 - disable CVE-2015-4025 patch - Fix bug #79037: global buffer-overflow in `mbfl_filt_conv_big5_wchar` (CVE-2020-7060) - Fix bug #79221: Null Pointer Dereference in PHP Session Upload Progress (CVE-2020-7062) - ALTPHP-186: add HardenedPHP patch for CVE-2016-5769 - CVE-2016-7412: Heap overflow in mysqlnd related to BIT fields - CVE-2016-6292: NULL Pointer Dereference in exif_process_user_comment - CVE-2016-6295: Use After Free Vulnerability in SNMP with GC and unserialize() - CVE-2016-5768: _php_mb_regex_ereg_replace_exec - double free - CVE-2016-5771: Use After Free Vulnerability in PHP's GC algorithm and unserialize - CVE-2016-7568: Integer Overflow in gdImageWebpCtx of gd_webp.c - CVE-2016-7411: Memory Corruption in During Deserialized-object Destruction - Fix bug #79797: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068) - Fixed bug #78862 (link() silently truncates after a null byte on Windows). (CVE-2019-11044) - Fix bug #79601: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069)
Updated packages:
  • alt-php73-7.3.33-5.2.el6.x86_64.rpm
    sha:2c54d1ea41bfdf7d212b6ce03a29975ee03a406a
  • alt-php70-7.0.33-66.2.el6.x86_64.rpm
    sha:cb7d2f87b0da5f7f77a93da9cc1bdfcbbe3a06e6
  • alt-php71-7.1.33-34.2.el6.x86_64.rpm
    sha:95598d1f97f51d628cd85417454b29fc6d8e53ec
  • alt-php72-7.2.34-19.2.el6.x86_64.rpm
    sha:6b295c09d207ff1cfbc11e524a38179def502f17
  • alt-php74-7.4.30-1.el6.x86_64.rpm
    sha:1e094383e57f0606d3fcf065afce0bbab3b9ea24
  • alt-php81-8.1.8-2.el6.x86_64.rpm
    sha:646af71b98c5b3242c1e61f7ad9bdde638a638f8
  • alt-php80-8.0.21-1.el6.x86_64.rpm
    sha:946b090c1006a38b303c23f3cca30701a4d3a2ad
  • alt-php56-5.6.40-65.el6.x86_64.rpm
    sha:982e1094aa7ffa4fc06348cab59997f8ba2b9697
  • alt-php55-5.5.38-114.el6.x86_64.rpm
    sha:403d137f5229dd82a926c891cebaf135ff1a91c9
  • alt-php54-5.4.45-133.el6.x86_64.rpm
    sha:974290cd41216dbbfd7215eab041b7b6aeb9521c
  • alt-php53-5.3.29-153.el6.x86_64.rpm
    sha:65ec360b92de56d67a8ccab1f1e5ab7d42ae2eda
  • alt-php52-5.2.17-186.1.el6.x86_64.rpm
    sha:8ab02baa742db0d7b646c4a41d3c8a853608d530
  • alt-php51-5.1.6-154.1.el6.x86_64.rpm
    sha:2d21697cb848c1450f27b1e47643dff5cc7218ce
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.