MGASA-2019-0253

Source
https://advisories.mageia.org/MGASA-2019-0253.html
Import Source
https://advisories.mageia.org/MGASA-2019-0253.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0253
Related
Published
2019-09-06T21:09:08Z
Modified
2019-09-06T19:03:44Z
Summary
Updated php packages fix security vulnerabilities
Details

Updated php packages fix security vulnerabilities:

A use-after-free in onignewdeluxe() in regext.c in the bundled Oniguruma allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression (CVE-2019-13224).

A NULL Pointer Dereference in match_at() in regexec.c in the bundled Oniguruma allows attackers to potentially cause denial of service by providing a crafted regular expression (CVE-2019-13225).

For other fixes in this update, see the referenced changelog.

References
Credits

Affected packages

Mageia:7 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.9-1.mga7

Ecosystem specific

{
    "section": "core"
}