Headline
RHSA-2021:2992: Red Hat Security Advisory: rh-php73-php security, bug fix, and enhancement update
An update for rh-php73-php is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: rh-php73-php (7.3.29). (BZ#1977764) Security Fix(es):
- php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069)
- php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071)
- php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
- php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068)
- php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070)
- php: NULL pointer dereference in SoapClient (CVE-2021-21702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Related CVEs:
- CVE-2020-7068: php: Use of freed hash key in the phar_parse_zipfile function
- CVE-2020-7069: php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV
- CVE-2020-7070: php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server
- CVE-2020-7071: php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo
- CVE-2021-21702: php: NULL pointer dereference in SoapClient
- CVE-2021-21705: php: SSRF bypass in FILTER_VALIDATE_URL