We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE IDs: CVE-2019-11036, CVE-2019-11038, CVE-2019-11039, CVE-2019-11040
Other security advisory IDs: USN-4009-1, openSUSE-SU-2019:1572-1, openSUSE-SU-2019:1778-1
Descriptions: Version 7.3.5, Version 7.3.6
Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG
Potential heap corruption in TSendMail()
Uninitialized read in gdImageCreateFromXbm
Out-of-bounds read in iconv.c:_php_iconv_mime_decode() due to integer overflow
heap-buffer-overflow on php_jpg_get16
Bypassing open_basedir restrictions via file uris
Patches: N/A
PoC(s): N/A
Architectural progress:
amd64
arm64
armel
ppc64
The text was updated successfully, but these errors were encountered:
php7: update to 7.3.6; #1900
24ddd1d
All done. @l2dy Please assign an AOSA.
Sorry, something went wrong.
@l2dy Please disregard the AOSA request above. This is superseded by #1995.
KexyBiscuit
No branches or pull requests
CVE IDs: CVE-2019-11036, CVE-2019-11038, CVE-2019-11039, CVE-2019-11040
Other security advisory IDs: USN-4009-1, openSUSE-SU-2019:1572-1, openSUSE-SU-2019:1778-1
Descriptions:
Version 7.3.5, Version 7.3.6
Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG
Potential heap corruption in TSendMail()
Uninitialized read in gdImageCreateFromXbm
Out-of-bounds read in iconv.c:_php_iconv_mime_decode() due to integer overflow
heap-buffer-overflow on php_jpg_get16
Bypassing open_basedir restrictions via file uris
Patches: N/A
PoC(s): N/A
Architectural progress:
amd64
arm64
armel
ppc64
The text was updated successfully, but these errors were encountered: