[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2020-1351 --- php73

ID: oval:org.secpod.oval:def:1601116Date: (C)2020-03-17   (M)2024-04-17
Class: PATCHFamily: unix




In PHP versions 7.3.x below 7.3.15 and 7.4.x below 7.4.3, while extracting PHAR files on Windows using phar extension, certain content inside PHAR file could lead to one-byte read past the allocated buffer. This could potentially lead to information disclosure or crash. In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 , and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash. In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator function, the files are added with default permissions even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted

Platform:
Amazon Linux AMI
Product:
php73
Reference:
ALAS-2020-1351
CVE-2020-7061
CVE-2020-7062
CVE-2020-7063
CVE    3
CVE-2020-7061
CVE-2020-7063
CVE-2020-7062
CPE    2
cpe:/o:amazon:linux
cpe:/a:php:php73

© SecPod Technologies