File _patchinfo of Package patchinfo.14048
<patchinfo incident="14048">
<issue tracker="bnc" id="1161982">VUL-1: CVE-2019-20433: aspell: encoding set to ucs-2 or ucs-4 for a string ending with a single '\0' byte leads to a buffer over-read</issue>
<issue tracker="bnc" id="1162629">VUL-0: CVE-2020-7059: php5,php72,php7,php53: Out of bounds read in php_strip_tags_ex</issue>
<issue tracker="bnc" id="1162632">VUL-0: CVE-2020-7060: php5,php72,php7,php53: Global buffer-overflow in mbfl_filt_conv_big5_wchar function</issue>
<issue tracker="cve" id="2020-7059"/>
<issue tracker="cve" id="2020-7060"/>
<issue tracker="cve" id="2019-20433"/>
<packager>pgajdos</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for php72</summary>
<description>This update for php72 fixes the following issues:
Security issues fixed:
- CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629).
- CVE-2020-7060: Fixed a global buffer-overflow in mbfl_filt_conv_big5_wchar (bsc#1162632).
- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).
</description>
</patchinfo>