Vulnerability Database
Blog
FAQ
Docs
MGASA-2018-0390
See a problem?
Please try reporting it
to the source
first.
Source
https://advisories.mageia.org/MGASA-2018-0390.html
Import Source
https://advisories.mageia.org/MGASA-2018-0390.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0390
Related
CVE-2018-14851
CVE-2018-14883
Published
2018-09-21T16:26:22Z
Modified
2018-09-21T16:04:16Z
Summary
Updated php packages fix security vulnerability
Details
Int Overflow lead to Heap OverFlow in exif
thumbnail
extract of exif.c (CVE-2018-14883)
heap-buffer-overflow (READ of size 48) while reading exif data (CVE-2018-14851)
XSS due to the header Transfer-Encoding: chunked
References
https://advisories.mageia.org/MGASA-2018-0390.html
https://bugs.mageia.org/show_bug.cgi?id=23564
http://us3.php.net/archive/2018.php#id2018-07-20-1
http://www.php.net/ChangeLog-5.php#5.6.37
Credits
Mageia - COORDINATOR
https://wiki.mageia.org/en/Packages_Security_Team
Affected packages
Mageia:6
/
php
Package
Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-6
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.6.38-1.mga6
Ecosystem specific
{ "section": "core" }
MGASA-2018-0390 - OSV