Your submission was sent successfully! Close

CVE-2019-11044

Published: 23 December 2019

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Does not exist

precise Not vulnerable
(code not compiled)
trusty Not vulnerable
(code not compiled)
upstream Not vulnerable
(debian: Windows specific issue)
xenial Does not exist

php7.0
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Does not exist

precise Does not exist

trusty Does not exist

upstream Not vulnerable
(debian: Windows specific issue)
xenial Not vulnerable
(code not compiled)
php7.2
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not compiled)
disco Not vulnerable
(code not compiled)
eoan Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

php7.3
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Not vulnerable
(code not compiled)
precise Does not exist

trusty Does not exist

upstream Not vulnerable
(debian: Windows specific issue)
xenial Does not exist