Red Hat Security Advisory 2020-1112-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include a cross site scripting vulnerability.
0ca548e0ef7f72ae710a0a6b1dd6e143afe4e960d46770e9909508108156f05c
Slackware Security Advisory - New wavpack packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
9cefb5e15aa67fbfa341c9f107fa051a63541401c64efa56a9eaf3dd2adda9cd
Red Hat Security Advisory 2019-2519-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include buffer overflow, bypass, cross site scripting, denial of service, information leakage, and null pointer vulnerabilities.
acffbdfe90b0a58970132a1847884fe8bf47723bf6191011cc4ac8b281a95407
Gentoo Linux Security Advisory 201812-1 - Multiple vulnerabilities have been found in PHP, the worst of which could result in a Denial of Service condition. Multiple versions are affected.
35dffac43998c4123c62e030862e8da7560714a07887e99c3b8788a2522a38b8
Debian Linux Security Advisory 4240-1 - Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language.
4369be1bc2fc15b16bcbc45b903b8da4f8ffb2ca89575a1dcfff84f66942c227
Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, and 14.2 to fix security issues.
d1aa5a62111a07197a2aaccfb382dbb33114dcf775f441d2e865493d97ae346a
Ubuntu Security Notice 3646-2 - USN-3646-1 fixed a vulnerability in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that PHP incorrectly handled opcache access controls when configured to use PHP-FPM. A local user could possibly use this issue to obtain sensitive information from another user's PHP applications. Various other issues were also addressed.
c40611a08b9ad45b2b520e451e6127c9a498e306b6b3a0882f04bb854dc3cdba
Ubuntu Security Notice 3646-1 - It was discovered that PHP incorrectly handled opcache access controls when configured to use PHP-FPM. A local user could possibly use this issue to obtain sensitive information from another user's PHP applications. It was discovered that the PHP iconv stream filter incorrect handled certain invalid multibyte sequences. A remote attacker could possibly use this issue to cause PHP to hang, resulting in a denial of service. Various other issues were also addressed.
d594a2d9cf1e36fd38aaa3272f6437dc9d3b16a37c21f734d17412f2ed0403fa
Debian Linux Security Advisory 4197-1 - Multiple vulnerabilities were discovered in the wavpack audio codec which could result in denial of service or the execution of arbitrary code if malformed media files are processed.
f04e4100084730e62de2034638b75416129020b6926314c10fa87ac49238bc41
Ubuntu Security Notice 3637-1 - Thuan Pham, Marcel Bohme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to execute arbitrary code or cause a denial of service. Thuan Pham, Marcel Bohme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to cause a denial of service. Various other issues were also addressed.
7302506fdc3a3a4504b15d1433490e5aa0a03c30a1e79a44e65fea5e839f4cc7
Red Hat Security Advisory 2018-0515-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Denial of service and authentication bypass vulnerabilities have been addressed.
63f57e12d1ff6e6de3caf8c2bbeab7c6f4e7a8c198e6a649dcc661d86b579252
Red Hat Security Advisory 2018-0414-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Security Fix: 389-ds-base: remote Denial of Service via search filters in SetUnicodeStringFromUTF_8 in collate.c 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c.
01e6560dd4bd72db6460c4f62b68c7d6b23dedcf9b9f74ef4531c5259b2486bb