SUSE: 2020:0397-1 important: php72
Summary
This update for php72 fixes the following issues: Security issues fixed: - CVE-2020-7059: Fixed an out-of-bounds read in php_strip_tags_ex (bsc#1162629). - CVE-2020-7060: Fixed a global buffer-overflow in mbfl_filt_conv_big5_wchar (bsc#1162632). - CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-397=1 - SUSE Linux Enterprise Software Development Kit 12-SP4: zypper in -t patch SUSE-SLE-SDK-12-SP4-2020-397=1 - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-...
Read the Full AdvisoryReferences
#1161982 #1162629 #1162632
Cross- CVE-2019-20433 CVE-2020-7059 CVE-2020-7060
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Module for Web Scripting 12
https://www.suse.com/security/cve/CVE-2019-20433.html
https://www.suse.com/security/cve/CVE-2020-7059.html
https://www.suse.com/security/cve/CVE-2020-7060.html
https://bugzilla.suse.com/1161982
https://bugzilla.suse.com/1162629
https://bugzilla.suse.com/1162632