{"id":"RLSA-2020:1624","summary":"Moderate: php:7.2 security, bug fix, and enhancement update","details":"PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.\n\nThe following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981)\n\nSecurity Fix(es):\n\n* php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)\n\n* php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637)\n\n* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)\n\n* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)\n\n* php: Invalid read in exif_process_SOFn() (CVE-2019-9640)\n\n* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)\n\n* php: Buffer over-read in exif_read_data() (CVE-2019-11040)\n\n* php: Buffer over-read in PHAR reading functions (CVE-2018-20783)\n\n* php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021)\n\n* php: memcpy with negative length via crafted DNS response (CVE-2019-9022)\n\n* php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023)\n\n* php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)\n\n* php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034)\n\n* php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035)\n\n* php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036)\n\n* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)\n\n* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.","modified":"2026-02-05T06:45:12.830118Z","published":"2020-04-28T08:57:54Z","upstream":["CVE-2018-20783","CVE-2019-11034","CVE-2019-11035","CVE-2019-11036","CVE-2019-11039","CVE-2019-11040","CVE-2019-11041","CVE-2019-11042","CVE-2019-9020","CVE-2019-9021","CVE-2019-9022","CVE-2019-9023","CVE-2019-9024","CVE-2019-9637","CVE-2019-9638","CVE-2019-9639","CVE-2019-9640"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2020:1624"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1680545"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1685123"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1685132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1685398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1685404"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1685412"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688897"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688922"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688934"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1688939"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1702246"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1702256"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707299"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1724152"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1724154"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1739459"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1739465"}],"affected":[{"package":{"name":"libzip","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/libzip?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.1-2.module+el8.4.0+413+c9202dda"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1624.json"}},{"package":{"name":"php","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.2.24-1.module+el8.4.0+413+c9202dda"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1624.json"}},{"package":{"name":"php-pear","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pear?distro=rocky-linux-8&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.10.5-9.module+el8.4.0+413+c9202dda"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1624.json"}},{"package":{"name":"php-pecl-apcu","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pecl-apcu?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.1.12-2.module+el8.4.0+413+c9202dda"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1624.json"}},{"package":{"name":"php-pecl-zip","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pecl-zip?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.15.3-1.module+el8.4.0+413+c9202dda"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:1624.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}