security/vuxml: Document PHP-exif vulnerabilities

This commit is contained in:
Bernard Spil 2019-05-11 09:14:20 +00:00
parent 11f540665e
commit 947e8bad18
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=501238

View File

@ -58,6 +58,43 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="c2d1693b-73cb-11e9-a1c7-b499baebfeaf">
<topic>PHP -- Multiple vulnerabilities in EXIF module</topic>
<affects>
<package>
<name>php71-exif</name>
<range><lt>7.1.28</lt></range>
</package>
<package>
<name>php72-exif</name>
<range><lt>7.2.17</lt></range>
</package>
<package>
<name>php73-exif</name>
<range><lt>7.3.4</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The PHP project reports:</p>
<blockquote cite="https://www.php.net/ChangeLog-7.php">
<p>Heap-buffer-overflow in php_ifd_get32s (CVE-2019-11034)</p>
<p>Heap-buffer-overflow in exif_iif_add_value (CVE-2019-11035)</p>
</blockquote>
</body>
</description>
<references>
<url>https://www.php.net/ChangeLog-7.php</url>
<cvename>CVE-2019-11034</cvename>
<cvename>CVE-2019-11035</cvename>
</references>
<dates>
<discovery>2019-04-04</discovery>
<entry>2019-05-11</entry>
</dates>
</vuln>
<vuln vid="065890c3-725e-11e9-b0e1-6cc21735f730">
<topic>PostgreSQL -- Selectivity estimators bypass row security policies</topic>
<affects>