CVE-2019-11048

NameCVE-2019-11048
DescriptionIn PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2261-1, DSA-4717-1, DSA-4719-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php7.3 (PTS)buster7.3.31-1~deb10u1fixed
buster (security)7.3.31-1~deb10u5fixed
php7.4 (PTS)bullseye (security), bullseye7.4.33-1+deb11u4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php5sourcejessie5.6.40+dfsg-0+deb8u12DLA-2261-1
php5source(unstable)(unfixed)
php7.0sourcestretch7.0.33-0+deb9u8DSA-4717-1
php7.0source(unstable)(unfixed)
php7.3sourcebuster7.3.19-1~deb10u1DSA-4719-1
php7.3source(unstable)(unfixed)
php7.4source(unstable)7.4.9-1

Notes

Fixed in PHP 7.2.31, 7.3.18, 7.4.6
PHP Bug: https://bugs.php.net/78875
PHP Bug: https://bugs.php.net/78876
https://github.com/php/php-src/commit/f43041250f82ed69bd4575655984fbfc842da266
https://github.com/php/php-src/commit/1c9bd513ac5c7c1d13d7f0dfa7c16a7ad2ce0f87
php-7.4: https://github.com/php/php-src/commit/a3924ab6542a358a3099de992b63b932a9570add
php-7.3: https://github.com/php/php-src/commit/f43041250f82ed69bd4575655984fbfc842da266
php-7.2: https://github.com/php/php-src/commit/f43041250f82ed69bd4575655984fbfc842da266
php-7.2: https://github.com/php/php-src/commit/1c9bd513ac5c7c1d13d7f0dfa7c16a7ad2ce0f87

Search for package or bug name: Reporting problems