PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981)
Security Fix(es):
php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)
php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637)
php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)
php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)
php: Invalid read in exif_process_SOFn() (CVE-2019-9640)
php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)
php: Buffer over-read in exif_read_data() (CVE-2019-11040)
php: Buffer over-read in PHAR reading functions (CVE-2018-20783)
php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021)
php: memcpy with negative length via crafted DNS response (CVE-2019-9022)
php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023)
php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)
php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034)
php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035)
php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036)
php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)
php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1680545
bugzilla.redhat.com/show_bug.cgi?id=1685123
bugzilla.redhat.com/show_bug.cgi?id=1685132
bugzilla.redhat.com/show_bug.cgi?id=1685398
bugzilla.redhat.com/show_bug.cgi?id=1685404
bugzilla.redhat.com/show_bug.cgi?id=1685412
bugzilla.redhat.com/show_bug.cgi?id=1688897
bugzilla.redhat.com/show_bug.cgi?id=1688922
bugzilla.redhat.com/show_bug.cgi?id=1688934
bugzilla.redhat.com/show_bug.cgi?id=1688939
bugzilla.redhat.com/show_bug.cgi?id=1702246
bugzilla.redhat.com/show_bug.cgi?id=1702256
bugzilla.redhat.com/show_bug.cgi?id=1707299
bugzilla.redhat.com/show_bug.cgi?id=1724152
bugzilla.redhat.com/show_bug.cgi?id=1724154
bugzilla.redhat.com/show_bug.cgi?id=1739459
bugzilla.redhat.com/show_bug.cgi?id=1739465
errata.rockylinux.org/RLSA-2020:1624