First published: Fri Nov 17 2017(Updated: )
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php71-php | <0:7.1.30-1.el7 | 0:7.1.30-1.el7 |
<7.0.27 | 7.0.27 | |
PHP PHP | >=7.0.0<7.0.27 | |
PHP PHP | >=7.1.0<7.1.13 | |
PHP PHP | >=7.2.0<7.2.1 | |
Netapp Storage Automation Store | ||
redhat/php | <7.0.27 | 7.0.27 |
redhat/php | <7.1.13 | 7.1.13 |
redhat/php | <7.2.1 | 7.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.