Bug 57400 - php7.3: Multiple issues (5.0)
php7.3: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-8-errata
Assigned To: Quality Assurance
Iván.Delgado
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2024-06-24 09:15 CEST by Quality Assurance
Modified: 2024-06-26 13:03 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2024-06-24 09:15:10 CEST
New Debian php7.3 7.3.31-1~deb10u7 fixes:
This update addresses the following issues:
7.3.31-1~deb10u7 (Mon, 17 Jun 2024 23:48:38 +0200)
* Non-maintainer upload by the LTS team.
* Fix CVE-2024-5458: Due to a code logic error, filtering functions such as  filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of  URLs the function will result in invalid user information (username +  password part of URLs) being treated as valid user information. This may  lead to the downstream code accepting invalid URLs as valid and parsing  them incorrectly. The problem is related to CVE-2020-7071, but affects IPv6  host parts.
Comment 1 Quality Assurance univentionstaff 2024-06-24 10:00:09 CEST
--- mirror/ftp/pool/main/p/php7.3/php7.3_7.3.31-1~deb10u6.dsc
+++ apt/ucs_5.0-0-errata5.0-8/source/php7.3_7.3.31-1~deb10u7.dsc
@@ -1,3 +1,15 @@
+7.3.31-1~deb10u7 [Mon, 17 Jun 2024 23:48:38 +0200] Markus Koschany <apo@debian.org>:
+
+  * Non-maintainer upload by the LTS team.
+  * Fix CVE-2024-5458:
+    Due to a code logic error, filtering functions such as filter_var when
+    validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the
+    function will result in invalid user information (username + password part
+    of URLs) being treated as valid user information. This may lead to the
+    downstream code accepting invalid URLs as valid and parsing them
+    incorrectly. The problem is related to CVE-2020-7071, but affects IPv6 host
+    parts.
+
 7.3.31-1~deb10u6 [Tue, 07 May 2024 02:47:26 +0200] Guilhem Moulin <guilhem@debian.org>:
 
   * Non-maintainer upload by the LTS Security Team.

<http://piuparts.knut.univention.de/5.0-8/#3825118531509681023>
Comment 2 Iván.Delgado univentionstaff 2024-06-25 12:57:37 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-8] ac9a3dc748 Bug #57400: php7.3 7.3.31-1~deb10u7
 doc/errata/staging/php7.3.yaml | 16 +++++-----------
 1 file changed, 5 insertions(+), 11 deletions(-)

[5.0-8] d27887bb4e Bug #57400: php7.3 7.3.31-1~deb10u7
 doc/errata/staging/php7.3.yaml | 21 +++++++++++++++++++++
 1 file changed, 21 insertions(+)
Comment 3 Iván.Delgado univentionstaff 2024-06-26 13:03:36 CEST
<https://errata.software-univention.de/#/?erratum=5.0x1070>