<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for php is now available for openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2342</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-05-15</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-05-15</InitialReleaseDate>
		<CurrentReleaseDate>2026-05-15</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-05-15</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">php security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for php is now available for openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.

Security Fix(es):

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the PDO Firebird driver improperly handles NUL bytes when preparing SQL queries. During token-by-token query construction, a string token containing a NUL byte is copied via strncat(), which stops at the NUL byte, dropping the closing quote and causing subsequent SQL tokens to be interpreted as part of the string. This allows SQL injection when attacker-controlled values are quoted via PDO::quote() and embedded in SQL statements.(CVE-2025-14179)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension&apos;s object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution.(CVE-2026-6722)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, 8.5.* before 8.5.6, due to improper sanitation of user data, it allows an attacker to compose an URL, which will cause the target to execute arbitrary JavaScript code (XSS) on the target&apos;s machine when the target is viewing the PHP-FPM status page.(CVE-2026-6735)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service.(CVE-2026-7258)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, a mismatch between encoding lists in Oniguruma and mbfl leads to  a NULL pointer dereference, resulting in a segmentation fault and denial of service. The vulnerability is exploitable when user-controlled input can influence the encoding passed to mb_regex_encoding().(CVE-2026-7259)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.(CVE-2026-7261)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element.  This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service.(CVE-2026-7262)

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.(CVE-2026-7568)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for php is now available for openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">php</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-14179</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6722</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6735</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7258</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7259</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7261</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7262</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-7568</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-14179</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6722</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6735</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7258</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7259</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7261</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7262</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-7568</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="php-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-bcmath-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-bcmath-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-cli-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-cli-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-common-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-common-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-dba-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-dba-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-dbg-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-dbg-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-debuginfo-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-debuginfo-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-debugsource-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-debugsource-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-devel-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-devel-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-embedded-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-embedded-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-enchant-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-enchant-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-ffi-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-ffi-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-fpm-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-fpm-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-gd-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-gd-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-gmp-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-gmp-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-intl-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-intl-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-ldap-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-ldap-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-mbstring-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-mbstring-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-mysqlnd-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-mysqlnd-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-odbc-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-odbc-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-opcache-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-opcache-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-pdo-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-pdo-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-pgsql-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-pgsql-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-process-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-process-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-snmp-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-snmp-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-soap-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-soap-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-sodium-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-sodium-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-tidy-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-tidy-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="php-xml-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-xml-8.3.31-1.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="php-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-8.3.31-1.oe2403.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="php-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-bcmath-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-bcmath-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-cli-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-cli-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-common-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-common-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-dba-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-dba-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-dbg-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-dbg-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-debuginfo-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-debuginfo-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-debugsource-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-debugsource-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-devel-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-devel-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-embedded-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-embedded-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-enchant-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-enchant-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-ffi-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-ffi-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-fpm-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-fpm-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-gd-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-gd-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-gmp-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-gmp-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-intl-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-intl-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-ldap-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-ldap-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-mbstring-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-mbstring-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-mysqlnd-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-mysqlnd-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-odbc-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-odbc-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-opcache-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-opcache-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-pdo-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-pdo-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-pgsql-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-pgsql-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-process-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-process-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-snmp-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-snmp-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-soap-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-soap-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-sodium-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-sodium-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-tidy-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-tidy-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="php-xml-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-xml-8.3.31-1.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="php-help-8.3.31-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">php-help-8.3.31-1.oe2403.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the PDO Firebird driver improperly handles NUL bytes when preparing SQL queries. During token-by-token query construction, a string token containing a NUL byte is copied via strncat(), which stops at the NUL byte, dropping the closing quote and causing subsequent SQL tokens to be interpreted as part of the string. This allows SQL injection when attacker-controlled values are quoted via PDO::quote() and embedded in SQL statements.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2025-14179</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension&apos;s object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-6722</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, 8.5.* before 8.5.6, due to improper sanitation of user data, it allows an attacker to compose an URL, which will cause the target to execute arbitrary JavaScript code (XSS) on the target&apos;s machine when the target is viewing the PHP-FPM status page.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-6735</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.1</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, some functions, including urldecode(), pass signed char to ctype functions (like isxdigit()). On the systems with default signed char and optimized table-lookup ctype functions - such as NetBSD - this can lead to accessing array with negative offset, which can trigger a denial of service.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7258</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, a mismatch between encoding lists in Oniguruma and mbfl leads to  a NULL pointer dereference, resulting in a segmentation fault and denial of service. The vulnerability is exploitable when user-controlled input can influence the encoding passed to mb_regex_encoding().</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7259</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7261</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element.  This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7262</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.3</BaseScore>
				<Vector>AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.</Note>
		</Notes>
		<ReleaseDate>2026-05-15</ReleaseDate>
		<CVE>CVE-2026-7568</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>php security update</Description>
				<DATE>2026-05-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2342</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>