An update for php is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1018
Final
1.0
1.0
2021-02-04
Initial
2021-02-04
2021-02-04
openEuler SA Tool V1.0
2021-02-04
php security update
An update for php is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.\r\n\r\n
Security Fix(es):\r\n\r\n
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.(CVE-2020-7071)\r\n\r\n
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.(CVE-2020-7059)\r\n\r\n
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.(CVE-2020-7062)\r\n\r\n
An update for php is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.\r\n\r\n
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
php
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1018
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-7071
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-7059
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-7062
https://nvd.nist.gov/vuln/detail/CVE-2020-7071
https://nvd.nist.gov/vuln/detail/CVE-2020-7059
https://nvd.nist.gov/vuln/detail/CVE-2020-7062
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
php-dba-7.2.10-10.oe1.aarch64.rpm
php-common-7.2.10-10.oe1.aarch64.rpm
php-xml-7.2.10-10.oe1.aarch64.rpm
php-enchant-7.2.10-10.oe1.aarch64.rpm
php-dbg-7.2.10-10.oe1.aarch64.rpm
php-process-7.2.10-10.oe1.aarch64.rpm
php-xmlrpc-7.2.10-10.oe1.aarch64.rpm
php-devel-7.2.10-10.oe1.aarch64.rpm
php-debugsource-7.2.10-10.oe1.aarch64.rpm
php-fpm-7.2.10-10.oe1.aarch64.rpm
php-odbc-7.2.10-10.oe1.aarch64.rpm
php-cli-7.2.10-10.oe1.aarch64.rpm
php-recode-7.2.10-10.oe1.aarch64.rpm
php-pdo-7.2.10-10.oe1.aarch64.rpm
php-pgsql-7.2.10-10.oe1.aarch64.rpm
php-help-7.2.10-10.oe1.aarch64.rpm
php-gmp-7.2.10-10.oe1.aarch64.rpm
php-embedded-7.2.10-10.oe1.aarch64.rpm
php-bcmath-7.2.10-10.oe1.aarch64.rpm
php-mysqlnd-7.2.10-10.oe1.aarch64.rpm
php-ldap-7.2.10-10.oe1.aarch64.rpm
php-snmp-7.2.10-10.oe1.aarch64.rpm
php-debuginfo-7.2.10-10.oe1.aarch64.rpm
php-gd-7.2.10-10.oe1.aarch64.rpm
php-tidy-7.2.10-10.oe1.aarch64.rpm
php-7.2.10-10.oe1.aarch64.rpm
php-json-7.2.10-10.oe1.aarch64.rpm
php-intl-7.2.10-10.oe1.aarch64.rpm
php-mbstring-7.2.10-10.oe1.aarch64.rpm
php-soap-7.2.10-10.oe1.aarch64.rpm
php-opcache-7.2.10-10.oe1.aarch64.rpm
php-odbc-7.2.10-11.oe1.aarch64.rpm
php-pdo-7.2.10-11.oe1.aarch64.rpm
php-help-7.2.10-11.oe1.aarch64.rpm
php-snmp-7.2.10-11.oe1.aarch64.rpm
php-debuginfo-7.2.10-11.oe1.aarch64.rpm
php-dbg-7.2.10-11.oe1.aarch64.rpm
php-recode-7.2.10-11.oe1.aarch64.rpm
php-pgsql-7.2.10-11.oe1.aarch64.rpm
php-devel-7.2.10-11.oe1.aarch64.rpm
php-json-7.2.10-11.oe1.aarch64.rpm
php-gmp-7.2.10-11.oe1.aarch64.rpm
php-tidy-7.2.10-11.oe1.aarch64.rpm
php-enchant-7.2.10-11.oe1.aarch64.rpm
php-intl-7.2.10-11.oe1.aarch64.rpm
php-process-7.2.10-11.oe1.aarch64.rpm
php-xmlrpc-7.2.10-11.oe1.aarch64.rpm
php-cli-7.2.10-11.oe1.aarch64.rpm
php-soap-7.2.10-11.oe1.aarch64.rpm
php-fpm-7.2.10-11.oe1.aarch64.rpm
php-common-7.2.10-11.oe1.aarch64.rpm
php-gd-7.2.10-11.oe1.aarch64.rpm
php-ldap-7.2.10-11.oe1.aarch64.rpm
php-embedded-7.2.10-11.oe1.aarch64.rpm
php-opcache-7.2.10-11.oe1.aarch64.rpm
php-7.2.10-11.oe1.aarch64.rpm
php-mysqlnd-7.2.10-11.oe1.aarch64.rpm
php-dba-7.2.10-11.oe1.aarch64.rpm
php-debugsource-7.2.10-11.oe1.aarch64.rpm
php-bcmath-7.2.10-11.oe1.aarch64.rpm
php-mbstring-7.2.10-11.oe1.aarch64.rpm
php-xml-7.2.10-11.oe1.aarch64.rpm
php-7.2.10-10.oe1.src.rpm
php-7.2.10-11.oe1.src.rpm
php-xml-7.2.10-10.oe1.x86_64.rpm
php-tidy-7.2.10-10.oe1.x86_64.rpm
php-json-7.2.10-10.oe1.x86_64.rpm
php-cli-7.2.10-10.oe1.x86_64.rpm
php-dbg-7.2.10-10.oe1.x86_64.rpm
php-mysqlnd-7.2.10-10.oe1.x86_64.rpm
php-opcache-7.2.10-10.oe1.x86_64.rpm
php-gmp-7.2.10-10.oe1.x86_64.rpm
php-intl-7.2.10-10.oe1.x86_64.rpm
php-help-7.2.10-10.oe1.x86_64.rpm
php-fpm-7.2.10-10.oe1.x86_64.rpm
php-debuginfo-7.2.10-10.oe1.x86_64.rpm
php-snmp-7.2.10-10.oe1.x86_64.rpm
php-embedded-7.2.10-10.oe1.x86_64.rpm
php-recode-7.2.10-10.oe1.x86_64.rpm
php-mbstring-7.2.10-10.oe1.x86_64.rpm
php-ldap-7.2.10-10.oe1.x86_64.rpm
php-xmlrpc-7.2.10-10.oe1.x86_64.rpm
php-gd-7.2.10-10.oe1.x86_64.rpm
php-bcmath-7.2.10-10.oe1.x86_64.rpm
php-devel-7.2.10-10.oe1.x86_64.rpm
php-debugsource-7.2.10-10.oe1.x86_64.rpm
php-enchant-7.2.10-10.oe1.x86_64.rpm
php-process-7.2.10-10.oe1.x86_64.rpm
php-common-7.2.10-10.oe1.x86_64.rpm
php-pdo-7.2.10-10.oe1.x86_64.rpm
php-dba-7.2.10-10.oe1.x86_64.rpm
php-soap-7.2.10-10.oe1.x86_64.rpm
php-odbc-7.2.10-10.oe1.x86_64.rpm
php-pgsql-7.2.10-10.oe1.x86_64.rpm
php-7.2.10-10.oe1.x86_64.rpm
php-enchant-7.2.10-11.oe1.x86_64.rpm
php-snmp-7.2.10-11.oe1.x86_64.rpm
php-gd-7.2.10-11.oe1.x86_64.rpm
php-mbstring-7.2.10-11.oe1.x86_64.rpm
php-dba-7.2.10-11.oe1.x86_64.rpm
php-json-7.2.10-11.oe1.x86_64.rpm
php-process-7.2.10-11.oe1.x86_64.rpm
php-xml-7.2.10-11.oe1.x86_64.rpm
php-opcache-7.2.10-11.oe1.x86_64.rpm
php-debugsource-7.2.10-11.oe1.x86_64.rpm
php-intl-7.2.10-11.oe1.x86_64.rpm
php-recode-7.2.10-11.oe1.x86_64.rpm
php-dbg-7.2.10-11.oe1.x86_64.rpm
php-mysqlnd-7.2.10-11.oe1.x86_64.rpm
php-pdo-7.2.10-11.oe1.x86_64.rpm
php-7.2.10-11.oe1.x86_64.rpm
php-common-7.2.10-11.oe1.x86_64.rpm
php-ldap-7.2.10-11.oe1.x86_64.rpm
php-odbc-7.2.10-11.oe1.x86_64.rpm
php-embedded-7.2.10-11.oe1.x86_64.rpm
php-tidy-7.2.10-11.oe1.x86_64.rpm
php-xmlrpc-7.2.10-11.oe1.x86_64.rpm
php-bcmath-7.2.10-11.oe1.x86_64.rpm
php-cli-7.2.10-11.oe1.x86_64.rpm
php-devel-7.2.10-11.oe1.x86_64.rpm
php-pgsql-7.2.10-11.oe1.x86_64.rpm
php-gmp-7.2.10-11.oe1.x86_64.rpm
php-fpm-7.2.10-11.oe1.x86_64.rpm
php-help-7.2.10-11.oe1.x86_64.rpm
php-debuginfo-7.2.10-11.oe1.x86_64.rpm
php-soap-7.2.10-11.oe1.x86_64.rpm
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
2021-02-04
CVE-2020-7071
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
8.2
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
php security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1018
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
2021-02-04
CVE-2020-7059
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
6.5
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
php security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1018
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
2021-02-04
CVE-2020-7062
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
php security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1018