rh-php70-php-7.0.27-1.el7

エラータID: AXSA:2018-3021:01

Release date: 
Friday, May 4, 2018 - 13:59
Subject: 
rh-php70-php-7.0.27-1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: rh-php70-php (7.0.27). (BZ#1518843)

Security Fix(es):

* php: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field (CVE-2016-7412)

* php: Use after free in wddx_deserialize (CVE-2016-7413)

* php: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile (CVE-2016-7414)

* php: Stack based buffer overflow in msgfmt_format_message (CVE-2016-7416)

* php: Missing type check when unserializing SplArray (CVE-2016-7417)

* php: Null pointer dereference in php_wddx_push_element (CVE-2016-7418)

* php: Use-after-free vulnerability when resizing the 'properties' hash table of a serialized object (CVE-2016-7479)

* php: Invalid read when wddx decodes empty boolean element (CVE-2016-9935)

* php: Use After Free in unserialize() (CVE-2016-9936)

* php: Wrong calculation in exif_convert_any_to_int function (CVE-2016-10158)

* php: Integer overflow in phar_parse_pharfile (CVE-2016-10159)

* php: Off-by-one error in phar_parse_pharfile when loading crafted phar archive (CVE-2016-10160)

* php: Out-of-bounds heap read on unserialize in finish_nested_data() (CVE-2016-10161)

* php: Null pointer dereference when unserializing PHP object (CVE-2016-10162)

* gd: DoS vulnerability in gdImageCreateFromGd2Ctx() (CVE-2016-10167)

* gd: Integer overflow in gd_io.c (CVE-2016-10168)

* php: Use of uninitialized memory in unserialize() (CVE-2017-5340)

* php: Buffer over-read from unitialized data in gdImageCreateFromGifCtx function (CVE-2017-7890)

* oniguruma: Out-of-bounds stack read in match_at() during regular expression searching (CVE-2017-9224)

* oniguruma: Heap buffer overflow in next_state_val() during regular expression compilation (CVE-2017-9226)

* oniguruma: Out-of-bounds stack read in mbc_enc_len() during regular expression searching (CVE-2017-9227)

* oniguruma: Out-of-bounds heap write in bitset_set_range() (CVE-2017-9228)

* oniguruma: Invalid pointer dereference in left_adjust_char_head() (CVE-2017-9229)

* php: Incorrect WDDX deserialization of boolean parameters leads to DoS (CVE-2017-11143)

* php: Incorrect return value check of OpenSSL sealing function leads to crash (CVE-2017-11144)

* php: Out-of-bounds read in phar_parse_pharfile (CVE-2017-11147)

* php: Stack-based buffer over-read in msgfmt_parse_message function (CVE-2017-11362)

* php: Stack based 1-byte buffer over-write in zend_ini_do_op() function Zend/zend_ini_parser.c (CVE-2017-11628)

* php: heap use after free in ext/standard/var_unserializer.re (CVE-2017-12932)

* php: heap use after free in ext/standard/var_unserializer.re (CVE-2017-12934)

* php: reflected XSS in .phar 404 page (CVE-2018-5712)

* php, gd: Stack overflow in gdImageFillToBorder on truecolor images (CVE-2016-9933)

* php: NULL Pointer Dereference in WDDX Packet Deserialization with PDORow (CVE-2016-9934)

* php: wddx_deserialize() heap out-of-bound read via php_parse_date() (CVE-2017-11145)

* php: buffer over-read in finish_nested_data function (CVE-2017-12933)

* php: Out-of-bound read in timelib_meridian() (CVE-2017-16642)

* php: Denial of Service (DoS) via infinite loop in libgd gdImageCreateFromGifCtx function in ext/gd/libgd/gd_gif_in.c (CVE-2018-5711)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For details, see the Asianux Software Collections 3.1 Release Notes linked from the References section.

CVE-2016-7412
ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.
CVE-2016-7413
Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
CVE-2016-7414
The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
CVE-2016-7416
ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.
CVE-2016-7417
ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
CVE-2016-7418
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
CVE-2016-7479
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
CVE-2016-9933
Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
CVE-2016-9934
ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
CVE-2016-9935
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
CVE-2016-9936
The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834.
CVE-2016-10158
The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
CVE-2016-10159
Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
CVE-2016-10160
Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch.
CVE-2016-10161
The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
CVE-2016-10162
The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
CVE-2016-10167
The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
CVE-2016-10168
Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
CVE-2017-5340
Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.
CVE-2017-7890
The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
CVE-2017-9227
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
CVE-2017-9228
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
CVE-2017-9229
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
CVE-2017-11143
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
CVE-2017-11144
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
CVE-2017-11145
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
CVE-2017-11147
In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
CVE-2017-11362
In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact within International Components for Unicode (ICU) for C/C via a long first argument to the msgfmt_parse_message function.
CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
CVE-2017-12932
ext/standard/var_unserializer.re in PHP 7.0.x through 7.0.22 and 7.1.x through 7.1.8 is prone to a heap use after free while unserializing untrusted data, related to improper use of the hash API for key deletion in a situation with an invalid array size. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
CVE-2017-12933
The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
CVE-2017-12934
ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x before 7.1.7 is prone to a heap use after free while unserializing untrusted data, related to the zval_get_type function in Zend/zend_types.h. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
CVE-2018-5712
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. rh-php70-php-7.0.27-1.el7.src.rpm
    MD5: 6d55a26e7931e3fe5ebb81134022190a
    SHA-256: 58a051b7a4395dc04aff165bca97b31fbe5efc7499aaf294fc28545248cf675e
    Size: 11.47 MB

Asianux Server 7 for x86_64
  1. rh-php70-php-7.0.27-1.el7.x86_64.rpm
    MD5: b5800d5c7dc32a18f5ea9b44879d5ca4
    SHA-256: a915d8cbc68d534fae0c7fbbceb89f751772395fb31f58268c5d22c32a626e77
    Size: 1.29 MB
  2. rh-php70-php-bcmath-7.0.27-1.el7.x86_64.rpm
    MD5: f3391f571d5a7969be697a7be6268a17
    SHA-256: 809a06b2cd591b683ef670f1baee6979369ce428f09aaba2ab1e216c42fffdd9
    Size: 58.79 kB
  3. rh-php70-php-cli-7.0.27-1.el7.x86_64.rpm
    MD5: f2c6a7d7432216601ea9232b359343e1
    SHA-256: 292f5fb0fa3b7a6c8ce9efcbe328a73dba28441915fe4db9b49813f61f5518b8
    Size: 2.63 MB
  4. rh-php70-php-common-7.0.27-1.el7.x86_64.rpm
    MD5: 77c8328599b6162861a9c596a1122f6c
    SHA-256: 1e46ff59f3629c42e1aa552adde588886caeadc104697773056a547cc2a292cb
    Size: 643.75 kB
  5. rh-php70-php-dba-7.0.27-1.el7.x86_64.rpm
    MD5: e193c44a710aacf848b715e8e72867be
    SHA-256: 52e7d42dd312b6826828a83b8a6c93782ac660ce8f43e571dff4957eb882c4af
    Size: 57.10 kB
  6. rh-php70-php-dbg-7.0.27-1.el7.x86_64.rpm
    MD5: 356e711a4358ffcd84ba1834609bd217
    SHA-256: 2787c98dd4127cf4909749b3b2a40f7a47d93a609c1cf5c610299c58271c223e
    Size: 1.39 MB
  7. rh-php70-php-devel-7.0.27-1.el7.x86_64.rpm
    MD5: 1ae2ac0b6e1924f718992f3dd4c262f3
    SHA-256: e4f18ce9e24017a3b8bf184081f472a066b8a4823d4a35cb83cbc04471efcd72
    Size: 659.55 kB
  8. rh-php70-php-embedded-7.0.27-1.el7.x86_64.rpm
    MD5: 12a02a2e08163ad219ef18a8a03a032d
    SHA-256: 398d8e58c22f57a01c4405ecaa352c1f78b49f26e8e4e7d50c1e610de1b16b8b
    Size: 1.28 MB
  9. rh-php70-php-enchant-7.0.27-1.el7.x86_64.rpm
    MD5: 4d35141748e889120d8646723cab43cc
    SHA-256: dcf1853a8bf140791f7535b9853be2d7c6f679d3e0db5dcb8bff77914df277e1
    Size: 43.32 kB
  10. rh-php70-php-fpm-7.0.27-1.el7.x86_64.rpm
    MD5: 0ede5c7c1d54e16d33c9713dbf79f547
    SHA-256: 4b5db76086bfcd7ee89c9b35e1e3849b9c96af8da9610e6598a09bd6cc451895
    Size: 1.36 MB
  11. rh-php70-php-gd-7.0.27-1.el7.x86_64.rpm
    MD5: 3153058eeeb9db06e560a10dd3b5b416
    SHA-256: bb28d19252e4fbe90f9daa297b7972d8f23f8a942ee95d70db5fa5da7af99955
    Size: 145.80 kB
  12. rh-php70-php-gmp-7.0.27-1.el7.x86_64.rpm
    MD5: e53f7340ddb08a36242bde5be89ccec4
    SHA-256: 3d16dcad0ce0c8c91efd8506492f8c473611740b32090396887f5ab79c815018
    Size: 54.93 kB
  13. rh-php70-php-intl-7.0.27-1.el7.x86_64.rpm
    MD5: 98af5f8d1dc9459c850dbeeae673af19
    SHA-256: 2d01e2ca3d3598389a25dd93f141891d7e04f8e79f98bb38472394994499456b
    Size: 164.05 kB
  14. rh-php70-php-json-7.0.27-1.el7.x86_64.rpm
    MD5: 4829cd905a8188b04b3ea4db7b57caa7
    SHA-256: f1ded6e51fabdd1fd0cc37933ed80c99087c192b30ca326ffd163a76174cb327
    Size: 51.25 kB
  15. rh-php70-php-ldap-7.0.27-1.el7.x86_64.rpm
    MD5: a8979576467956adbf6d9a971df09ba4
    SHA-256: 05fcab7e0fd6bc8059dc96e5f6ea95dd49eeacf1a1c00f8f1f07dd360cec324c
    Size: 55.35 kB
  16. rh-php70-php-mbstring-7.0.27-1.el7.x86_64.rpm
    MD5: c87bdf80504216b2a9c93dc271fed3ef
    SHA-256: a7f6cc236e2c843e08aec9801c1d15ade7d403a7efb66731bc6d3311de9cfc32
    Size: 519.52 kB
  17. rh-php70-php-mysqlnd-7.0.27-1.el7.x86_64.rpm
    MD5: 91f80abc27599f8d92ac84b821d4809c
    SHA-256: 8e6a8294bb695a7df7cf9edc1175d2e23c6d412eddfa48d0cc6ff1f0bdffa20a
    Size: 167.49 kB
  18. rh-php70-php-odbc-7.0.27-1.el7.x86_64.rpm
    MD5: 97dfef173258101968a3ec1324f8344c
    SHA-256: dffd086422df3c3e19adf92b85994016e89e499dd96db4ae11bd0ed6ecc3d119
    Size: 66.57 kB
  19. rh-php70-php-opcache-7.0.27-1.el7.x86_64.rpm
    MD5: dc9d0ea10fb88ead2d6f741ccd5cc454
    SHA-256: 4d210403640e799a5210cf7a1d79bbebd65b86c56dd3046f568b04ea02194b5d
    Size: 116.48 kB
  20. rh-php70-php-pdo-7.0.27-1.el7.x86_64.rpm
    MD5: 23f8ba48a3adeed30ce5a6aac8e401c8
    SHA-256: 3e79e5d061af6f0e77aae27bd33c09a651eb69907870ff7d2b7c256b063f48d5
    Size: 97.97 kB
  21. rh-php70-php-pgsql-7.0.27-1.el7.x86_64.rpm
    MD5: 1f6fb312124e1491606c108ade08aad7
    SHA-256: 4b3b08450a8616e830c870c98e7c97d7a75296c03c5a9fe107f7e6a3e2be448a
    Size: 93.47 kB
  22. rh-php70-php-process-7.0.27-1.el7.x86_64.rpm
    MD5: 2e7a8a9361392a0e0467b81c812c1d9a
    SHA-256: 1a36039c35c78a9c17c59d059be94390bbeba2ee9babd77c31e297b6524c689b
    Size: 60.96 kB
  23. rh-php70-php-pspell-7.0.27-1.el7.x86_64.rpm
    MD5: b2d598b7b5b42e0539d220e7ca325535
    SHA-256: 4a1f063a8e35fdca2c647f24f25c30c1ef348c72233a839aa305b64b2e25b3fb
    Size: 42.59 kB
  24. rh-php70-php-recode-7.0.27-1.el7.x86_64.rpm
    MD5: 840d1c1ecd3c0f28698010a69fc09a5a
    SHA-256: 7de9fe83dc4a5e782b13bf685b818c8a05ed948d46731d9b3e80b157d1c01124
    Size: 39.45 kB
  25. rh-php70-php-snmp-7.0.27-1.el7.x86_64.rpm
    MD5: 15ede64d40d526dce30cdd9bd8497721
    SHA-256: 6704d69233a38eda9d225d92975a524552d6267e79b4a808954316ea749ebd49
    Size: 53.24 kB
  26. rh-php70-php-soap-7.0.27-1.el7.x86_64.rpm
    MD5: b093694348f786c54cfb6449ac05f869
    SHA-256: 4e22437e841b5e0502268647e41dcb5ad7ff0c4f3615480d57b13917193a9ae3
    Size: 153.36 kB
  27. rh-php70-php-xml-7.0.27-1.el7.x86_64.rpm
    MD5: 6b755a3a8a2fac3a0d8c001ad157f39d
    SHA-256: 7da0b3641d5a78abbf4797437268b1ec2d481d1608fb3fa33bbae82ab9da7edc
    Size: 159.11 kB
  28. rh-php70-php-xmlrpc-7.0.27-1.el7.x86_64.rpm
    MD5: 021118be10e28b4a0e0714223ed78f03
    SHA-256: a26a64de23d379412692b7f7ddee998a9e84234a7ec20152d71203d68d5fdbbe
    Size: 68.67 kB
  29. rh-php70-php-zip-7.0.27-1.el7.x86_64.rpm
    MD5: 40724970541df600de38e3acfa9fecbf
    SHA-256: 169d6869691ab042e9e19745bff9e01fbe1bd26d9be00c7f134d270193dbfb95
    Size: 88.69 kB