Bug 52193 - php7.0: Multiple issues (4.4)
php7.0: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-6-errata
Assigned To: Quality Assurance
Felix Botner
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-10-07 13:14 CEST by Quality Assurance
Modified: 2020-10-14 15:28 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-10-07 13:14:21 CEST
New Debian php7.0 7.0.33-0+deb9u10 fixes:
This update addresses the following issue:
* PHP parses encoded cookie names so malicious `__Host-` cookies can be sent  (CVE-2020-7070)
Comment 1 Quality Assurance univentionstaff 2020-10-07 14:00:30 CEST
--- mirror/ftp/4.4/unmaintained/4.4-6/source/php7.0_7.0.33-0+deb9u9.dsc
+++ apt/ucs_4.4-0-errata4.4-6/source/php7.0_7.0.33-0+deb9u10.dsc
@@ -1,3 +1,9 @@
+7.0.33-0+deb9u10 [Tue, 06 Oct 2020 13:08:28 -0400] Roberto C. Sánchez <roberto@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2020-7070: Prevent malicious users from forging secure cookie prefix
+    names.
+
 7.0.33-0+deb9u9 [Mon, 24 Aug 2020 12:14:22 +0100] Chris Lamb <lamby@debian.org>:
 
   * CVE-2020-7068: Prevent a use-after-free vulnerability when parsing PHAR

<http://10.200.17.11/4.4-6/#28549591277657707>
Comment 2 Felix Botner univentionstaff 2020-10-07 14:43:53 CEST
puiparts failed
Comment 3 Quality Assurance univentionstaff 2020-10-07 14:50:51 CEST
--- mirror/ftp/4.4/unmaintained/4.4-6/source/php7.0_7.0.33-0+deb9u9.dsc
+++ apt/ucs_4.4-0-errata4.4-6/source/php7.0_7.0.33-0+deb9u10.dsc
@@ -1,3 +1,9 @@
+7.0.33-0+deb9u10 [Tue, 06 Oct 2020 13:08:28 -0400] Roberto C. Sánchez <roberto@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2020-7070: Prevent malicious users from forging secure cookie prefix
+    names.
+
 7.0.33-0+deb9u9 [Mon, 24 Aug 2020 12:14:22 +0100] Chris Lamb <lamby@debian.org>:
 
   * CVE-2020-7068: Prevent a use-after-free vulnerability when parsing PHAR

<http://10.200.17.11/4.4-6/#28549591277657707>
Comment 4 Quality Assurance univentionstaff 2020-10-07 16:00:21 CEST
--- mirror/ftp/4.4/unmaintained/4.4-6/source/php7.0_7.0.33-0+deb9u9.dsc
+++ apt/ucs_4.4-0-errata4.4-6/source/php7.0_7.0.33-0+deb9u10.dsc
@@ -1,3 +1,9 @@
+7.0.33-0+deb9u10 [Tue, 06 Oct 2020 13:08:28 -0400] Roberto C. Sánchez <roberto@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2020-7070: Prevent malicious users from forging secure cookie prefix
+    names.
+
 7.0.33-0+deb9u9 [Mon, 24 Aug 2020 12:14:22 +0100] Chris Lamb <lamby@debian.org>:
 
   * CVE-2020-7068: Prevent a use-after-free vulnerability when parsing PHAR

<http://10.200.17.11/4.4-6/#28549591277657707>
Comment 5 Felix Botner univentionstaff 2020-10-09 10:08:34 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-6] 31cd8cc48b Bug #52193: php7.0 7.0.33-0+deb9u10
 doc/errata/staging/php7.0.yaml | 13 +++++++++++++
 1 file changed, 13 insertions(+)