Mageia 2020-0387: php security update
Summary
In PHP versions 7.2.x when PHP is processing incoming HTTP cookie values, the
cookie names are url-decoded. This may lead to cookies with prefixes
like __Host confused with cookies that decode to such prefix, thus leading to
an attacker being able to forge cookie which is supposed to be secure.
(CVE-2020-7070)
These updated packages also fix several bugs:
Core:
- realpath() erroneously resolves link to link
- Stack use-after-scope in define()
- getimagesize function silently truncates after a null byte
- Memleak when coercing integers to string via variadic argument
Fileinfo: finfo_file crash (FILEINFO_MIME)
LDAP: Fixed memory leaks.
OPCache: opcache.file_cache causes SIGSEGV when custom opcode handlers changed.
Standard: Memory leak in str_replace of empty string
References
- https://bugs.mageia.org/show_bug.cgi?id=27239
- https://www.php.net/ChangeLog-7.php#PHP_7_3_23
- https://www.php.net/ChangeLog-7.php#PHP_7_3_22
- https://www.php.net/ChangeLog-7.php#PHP_7_3_21
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070
Resolution
MGASA-2020-0387 - Updated php packages fix a security vulnerability
SRPMS
- 7/core/php-7.3.23-1.mga7