<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for php is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2341</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-05-15</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-05-15</InitialReleaseDate>
		<CurrentReleaseDate>2026-05-15</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-05-15</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">php security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for php is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.

Security Fix(es):

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension&apos;s object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution.(CVE-2026-6722)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, a mismatch between encoding lists in Oniguruma and mbfl leads to  a NULL pointer dereference, resulting in a segmentation fault and denial of service. The vulnerability is exploitable when user-controlled input can influence the encoding passed to mb_regex_encoding().(CVE-2026-7259)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element.  This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service.(CVE-2026-7262)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.(CVE-2026-7568)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for php is now available for openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">php</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2341</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6722</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7259</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7262</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7568</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6722</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7259</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7262</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7568</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="php-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-bcmath-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-bcmath-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-cli-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-cli-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-common-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-common-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-dba-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dba-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-dbg-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dbg-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-debuginfo-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debuginfo-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-debugsource-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debugsource-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-devel-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-devel-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-embedded-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-embedded-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-enchant-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-enchant-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-ffi-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ffi-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-fpm-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-fpm-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-gd-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gd-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-gmp-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gmp-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-intl-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-intl-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-ldap-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ldap-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-mbstring-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mbstring-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-mysqlnd-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mysqlnd-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-odbc-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-odbc-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-opcache-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-opcache-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-pdo-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pdo-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-pgsql-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pgsql-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-process-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-process-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-snmp-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-snmp-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-soap-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-soap-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-sodium-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-sodium-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-tidy-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-tidy-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-xml-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-xml-8.0.30-12.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="php-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-8.0.30-12.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="php-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-bcmath-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-bcmath-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-cli-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-cli-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-common-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-common-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-dba-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dba-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-dbg-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-dbg-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-debuginfo-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debuginfo-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-debugsource-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-debugsource-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-devel-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-devel-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-embedded-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-embedded-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-enchant-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-enchant-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-ffi-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ffi-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-fpm-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-fpm-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-gd-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gd-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-gmp-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-gmp-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-intl-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-intl-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-ldap-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-ldap-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-mbstring-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mbstring-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-mysqlnd-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-mysqlnd-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-odbc-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-odbc-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-opcache-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-opcache-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-pdo-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pdo-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-pgsql-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-pgsql-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-process-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-process-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-snmp-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-snmp-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-soap-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-soap-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-sodium-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-sodium-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-tidy-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-tidy-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-xml-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-xml-8.0.30-12.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="php-help-8.0.30-12" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">php-help-8.0.30-12.oe2203sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension&apos;s object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-6722</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2341</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, a mismatch between encoding lists in Oniguruma and mbfl leads to  a NULL pointer dereference, resulting in a segmentation fault and denial of service. The vulnerability is exploitable when user-controlled input can influence the encoding passed to mb_regex_encoding().</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7259</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2341</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element.  This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7262</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.3</BaseScore>
				<Vector>AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2341</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7568</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2341</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>