Skip to content
GitLab
Explore
Sign in
Register
Commits on Source (2)
Let's try this syntax instead.
· e80ddceb
Markus Koschany
authored
Sep 02, 2018
e80ddceb
Merge branch 'master' of salsa.debian.org:security-tracker-team/security-tracker
· f214a693
Markus Koschany
authored
Sep 02, 2018
f214a693
Show whitespace changes
Inline
Side-by-side
data/CVE/list
View file @
f214a693
...
...
@@ -68992,8 +68992,7 @@ CVE-2017-9120 (PHP 7.x through 7.1.5 allows remote attackers to cause a denial o
- php7.2 <unfixed>
- php7.1 <unfixed>
- php7.0 <unfixed>
- php5 <removed>
php5 <not-affected> (Not reproducible, vulnerable code not present.)
- php5 <not-affected> (Not reproducible, vulnerable code not present.)
NOTE: PHP Bug: https://bugs.php.net/bug.php?id=74544
CVE-2017-9119 (The i_zval_ptr_dtor function in Zend/zend_variables.h in PHP 7.1.5 ...)
- php7.1 <unfixed> (unimportant)
...
...
@@ -69005,8 +69004,7 @@ CVE-2017-9118 (PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl vi
- php7.2 <unfixed>
- php7.1 <unfixed>
- php7.0 <unfixed>
- php5 <removed>
php5 <postponed> (not reproducible, most likely not affected)
- php5 <postponed> (not reproducible, most likely not affected)
NOTE: Check for Jessie again as soon as more information are available.
NOTE: PHP Bug: https://bugs.php.net/bug.php?id=74604
CVE-2017-9117 (In LibTIFF 4.0.7, the program processes BMP images without verifying ...)
...
...
@@ -75008,8 +75006,7 @@ CVE-2017-7272 (PHP through 7.1.11 enables potential SSRF in applications that ac
- php7.1 <unfixed>
- php7.0 <unfixed>
[stretch] - php7.0 <ignored> (Upstream patch breaks existing applications, revisit if a new approach has been identified)
- php5 <removed>
php5 <ignored> (Never applied to PHP 5 by upstream, breaks existing applications)
- php5 <ignored> (Never applied to PHP 5 by upstream, breaks existing applications)
NOTE: https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
NOTE: https://bugs.php.net/bug.php?id=74216
NOTE: Fixed in 7.1.4 and 7.0.18, but were later reverted: https://bugzilla.redhat.com/show_bug.cgi?id=1437837#c3