Fedora 31 : php (2020-94763cb98b)

medium Nessus Plugin ID 141295


New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Fedora host is missing a security update.


**PHP version 7.3.23** (01 Oct 2020)


- Fixed bug php#80048 (Bug php#69100 has not been fixed for Windows). (cmb)

- Fixed bug php#80049 (Memleak when coercing integers to string via variadic argument). (Nikita)

- Fixed bug php#79699 (PHP parses encoded cookie names so malicious `__Host-` cookies can be sent).
(**CVE-2020-7070**) (Stas)


- Fixed bug php#80007 (Potential type confusion in unixtojd() parameter parsing). (Andy Postnikov)


- Fixed bug php#80002 (calc free space for new interned string is wrong). (t-matsuno)

- Fixed bug php#79825 (opcache.file_cache causes SIGSEGV when custom opcode handlers changed). (SammyK)


- Fixed bug php#79601 (Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV). (**CVE-2020-7069**) (Jakub Zelenka)


- Fixed bug php#80027 (Terrible performance using $query->fetch on queries with many bind parameters (Matteo)


- Fixed bug php#79986 (str_ireplace bug with diacritics characters). (cmb)

- Fixed bug php#80077 (getmxrr test bug). (Rainer Jung)

- Fixed bug php#72941 (Modifying bucket->data by-ref has no effect any longer). (cmb)

- Fixed bug php#80067 (Omitting the port in bindto setting errors). (cmb)

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected php package.

See Also


Plugin Details

Severity: Medium

ID: 141295

File Name: fedora_2020-94763cb98b.nasl

Version: 1.5

Type: local

Agent: unix

Published: 10/8/2020

Updated: 11/6/2020

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Low

Score: 3.3


Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:php, cpe:/o:fedoraproject:fedora:31

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/7/2020

Vulnerability Publication Date: 10/2/2020

Reference Information

CVE: CVE-2020-7069, CVE-2020-7070

FEDORA: 2020-94763cb98b

IAVA: 2020-A-0445-S