Bug 53593 - php7.0: Multiple issues (4.4)
php7.0: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-8-errata
Assigned To: Quality Assurance
Erik Damrose
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-07-19 09:23 CEST by Quality Assurance
Modified: 2021-07-21 11:08 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2021-07-19 09:23:48 CEST
New Debian php7.0 7.0.33-0+deb9u11 fixes:
This update addresses the following issues:
* heap-based buffer overflow in cdf_read_property_info in cdf.c  (CVE-2019-18218)
* FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071)
* NULL pointer dereference in SoapClient (CVE-2021-21702)
* security issues in pdo_firebase module (CVE-2021-21704)
* SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
Comment 1 Quality Assurance univentionstaff 2021-07-19 10:01:09 CEST
--- mirror/ftp/4.4/unmaintained/4.4-7/source/php7.0_7.0.33-0+deb9u10.dsc
+++ apt/ucs_4.4-0-errata4.4-8/source/php7.0_7.0.33-0+deb9u11.dsc
@@ -1,3 +1,22 @@
+7.0.33-0+deb9u11 [Mon, 12 Jul 2021 20:15:58 +0200] Sylvain Beucler <beuc@debian.org>:
+
+  * Non-maintainer upload by the LTS Security Team.
+  * Fix CGI test suite (Closes: #991008).
+  * CVE-2019-18218: fileinfo: cdf_read_property_info in cdf.c does not
+    restrict the number of CDF_VECTOR elements, which allows a heap-based
+    buffer overflow (4-byte out-of-bounds write).
+  * CVE-2020-7071: when validating URL with functions like
+    filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with
+    invalid password as valid URL. This may lead to functions that rely on
+    URL being valid to mis-parse the URL and produce wrong data as
+    components of the URL.
+  * CVE-2021-21702: when using SOAP extension to connect to a SOAP server,
+    a malicious SOAP server could return malformed XML data as a response
+    that would cause PHP to access a null pointer and thus cause a crash.
+  * Backport Firebird test server.
+  * CVE-2021-21704: multiple firebird issues.
+  * CVE-2021-21705: SSRF bypass in FILTER_VALIDATE_URL.
+
 7.0.33-0+deb9u10 [Tue, 06 Oct 2020 13:08:28 -0400] Roberto C. Sánchez <roberto@debian.org>:
 
   * Non-maintainer upload by the LTS Team.

<http://piuparts.knut.univention.de/4.4-8/#28549591278740232>
Comment 2 Erik Damrose univentionstaff 2021-07-20 18:28:59 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-8] fa8b008047 Bug #53593: php7.0 7.0.33-0+deb9u11
 doc/errata/staging/php7.0.yaml | 21 +++++++++++++++++++++
 1 file changed, 21 insertions(+)