MGASA-2020-0066

Source
https://advisories.mageia.org/MGASA-2020-0066.html
Import Source
https://advisories.mageia.org/MGASA-2020-0066.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0066
Related
Published
2020-01-28T11:32:54Z
Modified
2020-01-28T11:08:47Z
Summary
Updated php packages fix security vulnerabilities
Details

Updated php packages fix security vulnerabilities:

Two buffer overflows in string and mbstring handling have been found (CVE-2020-7059, CVE-2020-7060).

Other security fixes have been applied: - Session: Fixed bug #79091 (heap use-after-free in sessioncreateid()). - Date: Fixed bug #79015 (undefined-behavior in php_date.c).

For other fixes in this update, see the referenced chagelog.

References
Credits

Affected packages

Mageia:7 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.14-1.mga7

Ecosystem specific

{
    "section": "core"
}