File _patchinfo of Package patchinfo.14228

<patchinfo incident="14228">
  <issue tracker="cve" id="2020-7063"/>
  <issue tracker="cve" id="2020-7059"/>
  <issue tracker="cve" id="2020-7060"/>
  <issue tracker="cve" id="2020-7062"/>
  <issue tracker="bnc" id="1165289">VUL-0: CVE-2020-7063: php5,php72,php7: creating PHAR archive using PharData:buildFromIterator() function will  add files  with default permissions</issue>
  <issue tracker="bnc" id="1162632">VUL-0: CVE-2020-7060: php5,php72,php7,php53: Global buffer-overflow in mbfl_filt_conv_big5_wchar function</issue>
  <issue tracker="bnc" id="1165280">VUL-1: CVE-2020-7062: php5,php72,php7: null pointer dereference when using file upload functionality under specific circumstances</issue>
  <issue tracker="bnc" id="1162629">VUL-0: CVE-2020-7059: php5,php72,php7,php53: Out of bounds read in php_strip_tags_ex</issue>
  <packager>pgajdos</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for php7</summary>
  <description>This update for php7 fixes the following issues:

- CVE-2020-7062: Fixed a null pointer dereference when using file upload functionality 
  under specific circumstances (bsc#1165280).
- CVE-2020-7063: Fixed an issue where adding files change the permissions to default (bsc#1165289).
- CVE-2020-7059: Fixed an out of bounds read in php_strip_tags_ex which may have led to 
  denial of service (bsc#1162629).
- CVE-2020-7060: Fixed a global buffer overflow in mbfl_filt_conv_big5_wchar which  may have  led to 
  memory corruption (bsc#1162632). 
</description>
</patchinfo>
openSUSE Build Service is sponsored by