diff options
-rw-r--r-- | meta-oe/recipes-devtools/php/php/CVE-2020-7070.patch | 24 | ||||
-rw-r--r-- | meta-oe/recipes-devtools/php/php_7.4.9.bb | 1 |
2 files changed, 25 insertions, 0 deletions
diff --git a/meta-oe/recipes-devtools/php/php/CVE-2020-7070.patch b/meta-oe/recipes-devtools/php/php/CVE-2020-7070.patch new file mode 100644 index 0000000000..e5b527f989 --- /dev/null +++ b/meta-oe/recipes-devtools/php/php/CVE-2020-7070.patch | |||
@@ -0,0 +1,24 @@ | |||
1 | Subject: Patch fix-urldecode for HTTP related Bug #79699 | ||
2 | |||
3 | --- | ||
4 | main/php_variables.c | 4 +++- | ||
5 | 1 file changed, 3 insertions(+), 1 deletion(-) | ||
6 | |||
7 | diff --git a/main/php_variables.c b/main/php_variables.c | ||
8 | index 1a40c2a1..cbdc7cf1 100644 | ||
9 | --- a/main/php_variables.c | ||
10 | +++ b/main/php_variables.c | ||
11 | @@ -514,7 +514,9 @@ SAPI_API SAPI_TREAT_DATA_FUNC(php_default_treat_data) | ||
12 | } | ||
13 | |||
14 | val = estrndup(val, val_len); | ||
15 | - php_url_decode(var, strlen(var)); | ||
16 | + if (arg != PARSE_COOKIE) { | ||
17 | + php_url_decode(var, strlen(var)); | ||
18 | + } | ||
19 | if (sapi_module.input_filter(arg, var, &val, val_len, &new_val_len)) { | ||
20 | php_register_variable_safe(var, val, new_val_len, &array); | ||
21 | } | ||
22 | -- | ||
23 | 2.25.1 | ||
24 | |||
diff --git a/meta-oe/recipes-devtools/php/php_7.4.9.bb b/meta-oe/recipes-devtools/php/php_7.4.9.bb index 1da5607835..bc58b5792e 100644 --- a/meta-oe/recipes-devtools/php/php_7.4.9.bb +++ b/meta-oe/recipes-devtools/php/php_7.4.9.bb | |||
@@ -30,6 +30,7 @@ SRC_URI_append_class-target = " \ | |||
30 | file://phar-makefile.patch \ | 30 | file://phar-makefile.patch \ |
31 | file://0001-opcache-config.m4-enable-opcache.patch \ | 31 | file://0001-opcache-config.m4-enable-opcache.patch \ |
32 | file://xfail_two_bug_tests.patch \ | 32 | file://xfail_two_bug_tests.patch \ |
33 | file://CVE-2020-7070.patch \ | ||
33 | " | 34 | " |
34 | 35 | ||
35 | S = "${WORKDIR}/php-${PV}" | 36 | S = "${WORKDIR}/php-${PV}" |