An update for php is now available for openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1056
Final
1.0
1.0
2021-03-05
Initial
2021-03-05
2021-03-05
openEuler SA Tool V1.0
2021-03-05
php security update
An update for php is now available for openEuler-20.03-LTS-SP1.
PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.
Security Fix(es):
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.(CVE-2020-7060)
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.(CVE-2020-7070)
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.(CVE-2020-7069)
An update for php is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Critical
php
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1056
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-7070
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-7069
https://nvd.nist.gov/vuln/detail/CVE-2020-7070
https://nvd.nist.gov/vuln/detail/CVE-2020-7069
openEuler-20.03-LTS-SP1
php-xml-7.2.10-13.oe1.aarch64.rpm
php-dba-7.2.10-13.oe1.aarch64.rpm
php-soap-7.2.10-13.oe1.aarch64.rpm
php-tidy-7.2.10-13.oe1.aarch64.rpm
php-pdo-7.2.10-13.oe1.aarch64.rpm
php-embedded-7.2.10-13.oe1.aarch64.rpm
php-7.2.10-13.oe1.aarch64.rpm
php-cli-7.2.10-13.oe1.aarch64.rpm
php-devel-7.2.10-13.oe1.aarch64.rpm
php-gd-7.2.10-13.oe1.aarch64.rpm
php-help-7.2.10-13.oe1.aarch64.rpm
php-mbstring-7.2.10-13.oe1.aarch64.rpm
php-debugsource-7.2.10-13.oe1.aarch64.rpm
php-ldap-7.2.10-13.oe1.aarch64.rpm
php-xmlrpc-7.2.10-13.oe1.aarch64.rpm
php-json-7.2.10-13.oe1.aarch64.rpm
php-snmp-7.2.10-13.oe1.aarch64.rpm
php-enchant-7.2.10-13.oe1.aarch64.rpm
php-opcache-7.2.10-13.oe1.aarch64.rpm
php-pgsql-7.2.10-13.oe1.aarch64.rpm
php-common-7.2.10-13.oe1.aarch64.rpm
php-odbc-7.2.10-13.oe1.aarch64.rpm
php-recode-7.2.10-13.oe1.aarch64.rpm
php-intl-7.2.10-13.oe1.aarch64.rpm
php-bcmath-7.2.10-13.oe1.aarch64.rpm
php-debuginfo-7.2.10-13.oe1.aarch64.rpm
php-dbg-7.2.10-13.oe1.aarch64.rpm
php-process-7.2.10-13.oe1.aarch64.rpm
php-fpm-7.2.10-13.oe1.aarch64.rpm
php-gmp-7.2.10-13.oe1.aarch64.rpm
php-mysqlnd-7.2.10-13.oe1.aarch64.rpm
php-7.2.10-13.oe1.src.rpm
php-json-7.2.10-13.oe1.x86_64.rpm
php-fpm-7.2.10-13.oe1.x86_64.rpm
php-embedded-7.2.10-13.oe1.x86_64.rpm
php-recode-7.2.10-13.oe1.x86_64.rpm
php-mbstring-7.2.10-13.oe1.x86_64.rpm
php-intl-7.2.10-13.oe1.x86_64.rpm
php-help-7.2.10-13.oe1.x86_64.rpm
php-mysqlnd-7.2.10-13.oe1.x86_64.rpm
php-gmp-7.2.10-13.oe1.x86_64.rpm
php-debugsource-7.2.10-13.oe1.x86_64.rpm
php-xml-7.2.10-13.oe1.x86_64.rpm
php-devel-7.2.10-13.oe1.x86_64.rpm
php-enchant-7.2.10-13.oe1.x86_64.rpm
php-pgsql-7.2.10-13.oe1.x86_64.rpm
php-7.2.10-13.oe1.x86_64.rpm
php-soap-7.2.10-13.oe1.x86_64.rpm
php-ldap-7.2.10-13.oe1.x86_64.rpm
php-odbc-7.2.10-13.oe1.x86_64.rpm
php-opcache-7.2.10-13.oe1.x86_64.rpm
php-pdo-7.2.10-13.oe1.x86_64.rpm
php-cli-7.2.10-13.oe1.x86_64.rpm
php-gd-7.2.10-13.oe1.x86_64.rpm
php-dba-7.2.10-13.oe1.x86_64.rpm
php-xmlrpc-7.2.10-13.oe1.x86_64.rpm
php-tidy-7.2.10-13.oe1.x86_64.rpm
php-process-7.2.10-13.oe1.x86_64.rpm
php-common-7.2.10-13.oe1.x86_64.rpm
php-bcmath-7.2.10-13.oe1.x86_64.rpm
php-debuginfo-7.2.10-13.oe1.x86_64.rpm
php-snmp-7.2.10-13.oe1.x86_64.rpm
php-dbg-7.2.10-13.oe1.x86_64.rpm
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
2021-02-10
CVE-2020-7060
openEuler-20.03-LTS-SP1
Critical
9.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
php security update
2021-03-05
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1038
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
2021-03-05
CVE-2020-7070
openEuler-20.03-LTS-SP1
Medium
5.3
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
php security update
2021-03-05
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1056
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.
2021-03-05
CVE-2020-7069
openEuler-20.03-LTS-SP1
Medium
6.5
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
php security update
2021-03-05
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1056