php: CVE-2020-7070

Security Advisory

References
https://nvd.nist.gov/vuln/detail/CVE-2020-7070
https://bugs.php.net/patch-display.php?bug=79699&patch=fix-urldecode&revision=1600650364
https://github.com/php/php-src/blob/master/main/php_variables.c

Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit aff8a1fefb)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
(cherry picked from commit 09f5a2ac5a)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
This commit is contained in:
Zheng Ruoqin 2020-12-15 15:22:57 +08:00 committed by Armin Kuster
parent cf29a55578
commit 8d4826f656
2 changed files with 25 additions and 0 deletions

View File

@ -0,0 +1,24 @@
Subject: Patch fix-urldecode for HTTP related Bug #79699
---
main/php_variables.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/main/php_variables.c b/main/php_variables.c
index 1a40c2a1..cbdc7cf1 100644
--- a/main/php_variables.c
+++ b/main/php_variables.c
@@ -514,7 +514,9 @@ SAPI_API SAPI_TREAT_DATA_FUNC(php_default_treat_data)
}
val = estrndup(val, val_len);
- php_url_decode(var, strlen(var));
+ if (arg != PARSE_COOKIE) {
+ php_url_decode(var, strlen(var));
+ }
if (sapi_module.input_filter(arg, var, &val, val_len, &new_val_len)) {
php_register_variable_safe(var, val, new_val_len, &array);
}
--
2.25.1

View File

@ -30,6 +30,7 @@ SRC_URI_append_class-target = " \
file://phar-makefile.patch \
file://0001-opcache-config.m4-enable-opcache.patch \
file://xfail_two_bug_tests.patch \
file://CVE-2020-7070.patch \
"
S = "${WORKDIR}/php-${PV}"