Commit:    99bdfa5d0b0ceb68c8b370e42c26e07d5cea60ed
Author:    Stanislav Malyshev <[email protected]>         Mon, 25 Feb 2019 
00:09:09 -0800
Parents:   450400cfa1b0e3333a16519efc3d252bf70a2a26
Branches:  master

Link:       
http://git.php.net/?p=web/php.git;a=commitdiff;h=99bdfa5d0b0ceb68c8b370e42c26e07d5cea60ed

Log:
Add CVEs for latest fixes.

Changed paths:
  M  ChangeLog-5.php
  M  ChangeLog-7.php

diff --git a/ChangeLog-5.php b/ChangeLog-5.php
index 26723c5..64273ed 100644
--- a/ChangeLog-5.php
+++ b/ChangeLog-5.php
@@ -13,27 +13,27 @@ site_header("PHP 5 ChangeLog", array("current" => "docs", 
"css" => array("change
 <ul><li>GD:
 <ul>
   <li><?php bugfix(77269); ?> (efree() on uninitialized Heap data in 
imagescale leads to 
-use-after-free).</li>
-  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on 
Heap).</li>
+use-after-free). (CVE-2016-10166)</li>
+  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on Heap). 
(CVE-2019-6977)</li>
 </ul></li>
 <li>Mbstring:
 <ul>
-  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token).</li>
-  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node).</li>
-  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte 
match_at).</li>
-  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string).</li>
-  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token).</li>
-  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode).</li>
-  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code).</li>
+  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token). (CVE-2019-9023)</li>
+  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node). (CVE-2019-9023)</li>
+  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte match_at). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string). (CVE-2019-9023)</li>
+  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode). (CVE-2019-9023)</li>
+  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code). 
(CVE-2019-9023)</li>
 </ul></li>
 <li>Phar:
 <ul>
-  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext).</li>
+  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext). (CVE-2019-9021)</li>
 </ul></li>
 <li>Xmlrpc:
 <ul>
-  <li><?php bugfix(77242); ?> (heap out of bounds read in 
xmlrpc_decode()).</li>
-  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code).</li>
+  <li><?php bugfix(77242); ?> (heap out of bounds read in xmlrpc_decode()). 
(CVE-2019-9020)</li>
+  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code). (CVE-2019-9024)</li>
 </ul></li>
 </ul>
 <!-- }}} --></section>
@@ -48,12 +48,12 @@ use-after-free).</li>
 <li>IMAP:
 <ul>
   <li><?php bugfix(77020); ?> (null pointer dereference in imap_mail).</li>
-  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter).</li>
+  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter). (CVE-2018-19518)</li>
 </ul></li>
 <li>Phar:
 <ul>
   <li><?php bugfix(77022); ?> (PharData always creates new files with mode 
0666).</li>
-  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile).</li>
+  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile). (CVE-2018-20783)</li>
 </ul></li>
 </ul>
 <!-- }}} --></section>
diff --git a/ChangeLog-7.php b/ChangeLog-7.php
index 3eb47bf..d76cdbb 100644
--- a/ChangeLog-7.php
+++ b/ChangeLog-7.php
@@ -68,7 +68,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 <b><?php release_date('07-Feb-2019'); ?></b>
 <ul><li>Core:
 <ul>
-  <li><?php bugfix(77369); ?> (memcpy with negative length via crafted DNS 
response).</li>
+  <li><?php bugfix(77369); ?> (memcpy with negative length via crafted DNS 
response). (CVE-2019-9022)</li>
   <li><?php bugfix(77387); ?> (Recursion detection broken when printing 
GLOBALS).</li>
   <li><?php bugfix(77376); ?> ("undefined function" message no longer includes 
namespace).</li>
   <li><?php bugfix(77357); ?> (base64_encode / base64_decode doest not work on 
nested VM).</li>
@@ -179,19 +179,19 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
   <li><?php bugfix(77195); ?> (Incorrect error handling of 
imagecreatefromjpeg()).</li>
   <li><?php bugfix(77198); ?> (auto cropping has insufficient precision).</li>
   <li><?php bugfix(77200); ?> (imagecropauto(…, GD_CROP_SIDES) crops left but 
not right).</li>
-  <li><?php bugfix(77269); ?> (efree() on uninitialized Heap data in 
imagescale leads to use-after-free).</li>
-  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on 
Heap).</li>
+  <li><?php bugfix(77269); ?> (efree() on uninitialized Heap data in 
imagescale leads to use-after-free). (CVE-2016-10166)</li>
+  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on Heap). 
(CVE-2019-6977)</li>
 </ul></li>
 <li>MBString:
 <ul>
-  <li><?php bugfix(77367); ?> (Negative size parameter in mb_split).</li>
-  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token).</li>
-  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node).</li>
-  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte 
match_at).</li>
-  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string).</li>
-  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token).</li>
-  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode).</li>
-  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code).</li>
+  <li><?php bugfix(77367); ?> (Negative size parameter in mb_split). 
(CVE-2019-9025)</li>
+  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token). (CVE-2019-9023)</li>
+  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node). (CVE-2019-9023)</li>
+  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte match_at). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string). (CVE-2019-9023)</li>
+  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode). (CVE-2019-9023)</li>
+  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code). 
(CVE-2019-9023)</li>
 </ul></li>
 <li>OCI8:
 <ul>
@@ -214,7 +214,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>Phar:
 <ul>
-  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext).</li>
+  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext). (CVE-2019-9021)</li>
 </ul></li>
 <li>Soap:
 <ul>
@@ -239,8 +239,8 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>Xmlrpc:
 <ul>
-  <li><?php bugfix(77242); ?> (heap out of bounds read in 
xmlrpc_decode()).</li>
-  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code).</li>
+  <li><?php bugfix(77242); ?> (heap out of bounds read in xmlrpc_decode()). 
(CVE-2019-9020)</li>
+  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code). (CVE-2019-9024)</li>
 </ul></li>
 </ul>
 <!-- }}} --></section>
@@ -250,7 +250,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 <b><?php release_date('10-Jan-2019'); ?></b>
 <ul><li>Core:
 <ul>
-  <li><?php bugfix(77369); ?> (memcpy with negative length via crafted DNS 
response).</li>
+  <li><?php bugfix(77369); ?> (memcpy with negative length via crafted DNS 
response). (CVE-2019-9022)</li>
   <li><?php bugfix(71041); ?> (zend_signal_startup() needs ZEND_API).</li>
   <li><?php bugfix(76046); ?> (PHP generates "FE_FREE" opcode on the wrong 
line).</li>
 </ul></li>
@@ -268,8 +268,8 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>GD:
 <ul>
-  <li><?php bugfix(77269); ?> (efree() on uninitialized Heap data in 
imagescale leads to use-after-free).</li>
-  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on 
Heap).</li>
+  <li><?php bugfix(77269); ?> (efree() on uninitialized Heap data in 
imagescale leads to use-after-free). (CVE-2016-10166)</li>
+  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on Heap). 
(CVE-2019-6977)</li>
   <li><?php bugfix(77195); ?> (Incorrect error handling of 
imagecreatefromjpeg()).</li>
   <li><?php bugfix(77198); ?> (auto cropping has insufficient precision).</li>
   <li><?php bugfix(77200); ?> (imagecropauto(…, GD_CROP_SIDES) crops left but 
not right).</li>
@@ -280,13 +280,13 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>Mbstring:
 <ul>
-  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token).</li>
-  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node).</li>
-  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte 
match_at).</li>
-  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string).</li>
-  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token).</li>
-  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode).</li>
-  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code).</li>
+  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token). (CVE-2019-9023)</li>
+  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node). (CVE-2019-9023)</li>
+  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte match_at). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string). (CVE-2019-9023)</li>
+  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode). (CVE-2019-9023)</li>
+  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code). 
(CVE-2019-9023)</li>
 </ul></li>
 <li>OCI8:
 <ul>
@@ -304,7 +304,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>Phar:
 <ul>
-  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext).</li>
+  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext). (CVE-2019-9021)</li>
 </ul></li>
 <li>Sockets:
 <ul>
@@ -316,8 +316,8 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>Xmlrpc:
 <ul>
-  <li><?php bugfix(77242); ?> (heap out of bounds read in 
xmlrpc_decode()).</li>
-  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code).</li>
+  <li><?php bugfix(77242); ?> (heap out of bounds read in xmlrpc_decode()). 
(CVE-2019-9020)</li>
+  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code). (CVE-2019-9024)</li>
 </ul></li>
 </ul>
 <!-- }}} --></section>
@@ -327,12 +327,12 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 <b><?php release_date('10-Jan-2019'); ?></b>
 <ul><li>Core:
 <ul>
-  <li><?php bugfix(77369); ?> (memcpy with negative length via crafted DNS 
response).</li>
+  <li><?php bugfix(77369); ?> (memcpy with negative length via crafted DNS 
response). (CVE-2019-9022)</li>
 </ul></li>
 <li>GD:
 <ul>
-  <li><?php bugfix(77269); ?> (efree() on uninitialized Heap data in 
imagescale leads to use-after-free).</li>
-  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on 
Heap).</li>
+  <li><?php bugfix(77269); ?> (efree() on uninitialized Heap data in 
imagescale leads to use-after-free). (CVE-2016-10166)</li>
+  <li><?php bugfix(77270); ?> (imagecolormatch Out Of Bounds Write on Heap). 
(CVE-2019-6977)</li>
 </ul></li>
 <li>IMAP:
 <ul>
@@ -340,22 +340,22 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>Mbstring:
 <ul>
-  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token).</li>
-  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node).</li>
-  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte 
match_at).</li>
-  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string).</li>
-  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token).</li>
-  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode).</li>
-  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code).</li>
+  <li><?php bugfix(77370); ?> (Buffer overflow on mb regex functions - 
fetch_token). (CVE-2019-9023)</li>
+  <li><?php bugfix(77371); ?> (heap buffer overflow in mb regex functions - 
compile_string_node). (CVE-2019-9023)</li>
+  <li><?php bugfix(77381); ?> (heap buffer overflow in multibyte match_at). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77382); ?> (heap buffer overflow due to incorrect length in 
expand_case_fold_string). (CVE-2019-9023)</li>
+  <li><?php bugfix(77385); ?> (buffer overflow in fetch_token). 
(CVE-2019-9023)</li>
+  <li><?php bugfix(77394); ?> (Buffer overflow in multibyte case folding - 
unicode). (CVE-2019-9023)</li>
+  <li><?php bugfix(77418); ?> (Heap overflow in utf32be_mbc_to_code). 
(CVE-2019-9023)</li>
 </ul></li>
 <li>Phar:
 <ul>
-  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext).</li>
+  <li><?php bugfix(77247); ?> (heap buffer overflow in 
phar_detect_phar_fname_ext). (CVE-2019-9021)</li>
 </ul></li>
 <li>Xmlrpc:
 <ul>
-  <li><?php bugfix(77242); ?> (heap out of bounds read in 
xmlrpc_decode()).</li>
-  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code).</li>
+  <li><?php bugfix(77242); ?> (heap out of bounds read in xmlrpc_decode()). 
(CVE-2019-9020)</li>
+  <li><?php bugfix(77380); ?> (Global out of bounds read in xmlrpc base64 
code). (CVE-2019-9024)</li>
 </ul></li>
 </ul>
 <!-- }}} --></section>
@@ -370,12 +370,12 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 <li>IMAP:
 <ul>
   <li><?php bugfix(77020); ?> (null pointer dereference in imap_mail).</li>
-  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter).</li>
+  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter). (CVE-2018-19518)</li>
 </ul></li>
 <li>Phar:
 <ul>
   <li><?php bugfix(77022); ?> (PharData always creates new files with mode 
0666).</li>
-  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile).</li>
+  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile). (CVE-2018-20783)</li>
 </ul></li>
 </ul>
 <!-- }}} --></section>
@@ -506,7 +506,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>IMAP:
 <ul>
-  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter).</li>
+  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter). (CVE-2018-19518)</li>
   <li><?php bugfix(77020); ?> (null pointer dereference in imap_mail).</li>
 </ul></li>
 <li>Interbase:
@@ -615,7 +615,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
   <li><?php bugfix(74991); ?> (include_path has a 4096 char limit in some 
cases).</li>
   <li><?php bugfix(65414); ?> (deal with leading slash when adding files 
correctly).</li>
   <li><?php bugfix(77022); ?> (PharData always creates new files with mode 
0666).</li>
-  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile).</li>
+  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile). (CVE-2018-20783)</li>
 </ul></li>
 <li>readline:
 <ul>
@@ -730,7 +730,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>IMAP:
 <ul>
-  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter).</li>
+  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter). (CVE-2018-19518)</li>
 </ul></li>
 <li>ODBC:
 <ul>
@@ -744,7 +744,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 <li>Phar:
 <ul>
   <li><?php bugfix(77022); ?> (PharData always creates new files with mode 
0666).</li>
-  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile).</li>
+  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile). (CVE-2018-20783)</li>
 </ul></li>
 <li>PGSQL:
 <ul>
@@ -781,7 +781,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 </ul></li>
 <li>IMAP:
 <ul>
-  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter).</li>
+  <li><?php bugfix(77153); ?> (imap_open allows to run arbitrary shell 
commands via mailbox parameter). (CVE-2018-19518)</li>
 </ul></li>
 <li>ODBC:
 <ul>
@@ -794,7 +794,7 @@ site_header("PHP 7 ChangeLog", array("current" => "docs", 
"css" => array("change
 <li>Phar:
 <ul>
   <li><?php bugfix(77022); ?> (PharData always creates new files with mode 
0666).</li>
-  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile).</li>
+  <li><?php bugfix(77143); ?> (Heap Buffer Overflow (READ: 4) in 
phar_parse_pharfile). (CVE-2018-20783)</li>
 </ul></li>
 <li>PGSQL:
 <ul>
-- 
PHP Webmaster List Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to