-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3172
     Moderate: rh-php71-php security, bug fix, and enhancement update
                              20 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rh-php71-php
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
                   Access Confidential Data        -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11040 CVE-2019-11039 CVE-2019-11038
                   CVE-2019-11036 CVE-2019-11035 CVE-2019-11034
                   CVE-2019-9640 CVE-2019-9639 CVE-2019-9638
                   CVE-2019-9637 CVE-2019-9024 CVE-2019-9023
                   CVE-2019-9022 CVE-2019-9021 CVE-2019-9020
                   CVE-2019-6977 CVE-2018-20783 CVE-2018-17082
                   CVE-2018-14884 CVE-2018-14851 CVE-2018-10549
                   CVE-2018-10548 CVE-2018-10547 CVE-2018-10546
                   CVE-2018-10545 CVE-2018-7584 CVE-2018-5712
                   CVE-2018-5711 CVE-2017-16642 CVE-2017-12932
                   CVE-2017-9120 CVE-2017-9118 CVE-2016-10166

Reference:         ASB-2018.0070
                   ESB-2019.2599
                   ESB-2019.2465
                   ESB-2019.2419
                   ESB-2019.2374

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:2519

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rh-php71-php security, bug fix, and enhancement update
Advisory ID:       RHSA-2019:2519-01
Product:           Red Hat Software Collections
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2519
Issue date:        2019-08-19
CVE Names:         CVE-2016-10166 CVE-2017-9118 CVE-2017-9120 
                   CVE-2017-12932 CVE-2017-16642 CVE-2018-5711 
                   CVE-2018-5712 CVE-2018-7584 CVE-2018-10545 
                   CVE-2018-10546 CVE-2018-10547 CVE-2018-10548 
                   CVE-2018-10549 CVE-2018-14851 CVE-2018-14884 
                   CVE-2018-17082 CVE-2018-20783 CVE-2019-6977 
                   CVE-2019-9020 CVE-2019-9021 CVE-2019-9022 
                   CVE-2019-9023 CVE-2019-9024 CVE-2019-9637 
                   CVE-2019-9638 CVE-2019-9639 CVE-2019-9640 
                   CVE-2019-11034 CVE-2019-11035 CVE-2019-11036 
                   CVE-2019-11038 CVE-2019-11039 CVE-2019-11040 
=====================================================================

1. Summary:

An update for rh-php71-php is now available for Red Hat Software
Collections.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.

The following packages have been upgraded to a later upstream version:
rh-php71-php (7.1.30). (BZ#1631672)

Security Fix(es):

* gd: Unsigned integer underflow _gdContributionsAlloc() (CVE-2016-10166)

* php: Out of bounds access in php_pcre.c:php_pcre_replace_impl()
(CVE-2017-9118)

* php: Integer overflow in mysqli_api.c:mysqli_real_escape_string()
(CVE-2017-9120)

* php: Heap use after free in ext/standard/var_unserializer.re
(CVE-2017-12932)

* php: Reflected XSS in .phar 404 page (CVE-2018-5712)

* php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in
http_fopen_wrapper.c when parsing HTTP response (CVE-2018-7584)

* php: Infinite loop in ext/iconv/iconv.c when using stream filter with
convert.incov on invalid sequence leads to denial-of-service
(CVE-2018-10546)

* php: Reflected XSS vulnerability on PHAR 403 and 404 error pages
(CVE-2018-10547)

* php: NULL pointer dereference due to mishandling of ldap_get_dn return
value allows DoS via malicious LDAP server reply (CVE-2018-10548)

* php: Mishandled http_header_value in an atoi() call in
http_fopen_wrapper.c (CVE-2018-14884)

* php: Cross-site scripting (XSS) flaw in Apache2 component via body of
'Transfer-Encoding: chunked' request (CVE-2018-17082)

* gd: Heap based buffer overflow in gdImageColorMatch() in gd_color_match.c
(CVE-2019-6977)

* php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)

* php: File rename across filesystems may allow unwanted access during
processing (CVE-2019-9637)

* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)

* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)

* php: Invalid read in exif_process_SOFn() (CVE-2019-9640)

* php: Out-of-bounds read due to integer overflow in
iconv_mime_decode_headers() (CVE-2019-11039)

* php: Buffer over-read in exif_read_data() (CVE-2019-11040)

* php: Out-of-bound read in timelib_meridian() (CVE-2017-16642)

* gd: Infinite loop in gdImageCreateFromGifCtx() in gd_gif_in.c
(CVE-2018-5711)

* php: Dumpable FPM child processes allow bypassing opcache access controls
(CVE-2018-10545)

* php: Out-of-bounds read in ext/exif/exif.c:exif_read_data() when reading
crafted JPEG data (CVE-2018-10549)

* php: exif: Buffer over-read in exif_process_IFD_in_MAKERNOTE()
(CVE-2018-14851)

* php: Buffer over-read in PHAR reading functions (CVE-2018-20783)

* php: Heap-based buffer over-read in PHAR reading functions
(CVE-2019-9021)

* php: memcpy with negative length via crafted DNS response (CVE-2019-9022)

* php: Heap-based buffer over-read in mbstring regular expression functions
(CVE-2019-9023)

* php: Out-of-bounds read in base64_decode_xmlrpc in
ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)

* php: Heap buffer overflow in function exif_process_IFD_TAG()
(CVE-2019-11034)

* php: Heap buffer overflow in function exif_iif_add_value()
(CVE-2019-11035)

* php: Buffer over-read in exif_process_IFD_TAG() leading to information
disclosure (CVE-2019-11036)

* gd: Information disclosure in gdImageCreateFromXbm() (CVE-2019-11038)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon must be restarted
for the update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1418983 - CVE-2016-10166 gd: Unsigned integer underflow _gdContributionsAlloc()
1484837 - CVE-2017-12932 php: Heap use after free in ext/standard/var_unserializer.re
1512057 - CVE-2017-16642 php: Out-of-bound read in timelib_meridian()
1535246 - CVE-2018-5711 gd: Infinite loop in gdImageCreateFromGifCtx() in gd_gif_in.c
1535251 - CVE-2018-5712 php: Reflected XSS in .phar 404 page
1551039 - CVE-2018-7584 php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in http_fopen_wrapper.c when parsing HTTP response
1563858 - CVE-2018-10545 php: Dumpable FPM child processes allow bypassing opcache access controls
1573797 - CVE-2018-10549 php: Out-of-bounds read in ext/exif/exif.c:exif_read_data() when reading crafted JPEG data
1573802 - CVE-2018-10546 php: Infinite loop in ext/iconv/iconv.c when using stream filter with convert.incov on invalid sequence leads to denial-of-service
1573805 - CVE-2018-10548 php: NULL pointer dereference due to mishandling of ldap_get_dn return value allows DoS via malicious LDAP server reply
1573814 - CVE-2018-10547 php: Reflected XSS vulnerability on PHAR 403 and 404 error pages
1609642 - CVE-2018-14851 php: exif: Buffer over-read in exif_process_IFD_in_MAKERNOTE()
1611890 - CVE-2017-9118 php: Out of bounds access in php_pcre.c:php_pcre_replace_impl()
1611898 - CVE-2017-9120 php: Integer overflow in mysqli_api.c:mysqli_real_escape_string()
1612362 - CVE-2018-14884 php: Mishandled http_header_value in an atoi() call in http_fopen_wrapper.c
1629552 - CVE-2018-17082 php: Cross-site scripting (XSS) flaw in Apache2 component via body of 'Transfer-Encoding: chunked' request
1672207 - CVE-2019-6977 gd: Heap based buffer overflow in gdImageColorMatch() in gd_color_match.c
1680545 - CVE-2018-20783 php: Buffer over-read in PHAR reading functions
1685123 - CVE-2019-9020 php: Invalid memory access in function xmlrpc_decode()
1685132 - CVE-2019-9021 php: Heap-based buffer over-read in PHAR reading functions
1685398 - CVE-2019-9023 php: Heap-based buffer over-read in mbstring regular expression functions
1685404 - CVE-2019-9024 php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c
1685412 - CVE-2019-9022 php: memcpy with negative length via crafted DNS response
1688897 - CVE-2019-9637 php: File rename across filesystems may allow unwanted access during processing
1688922 - CVE-2019-9638 php: Uninitialized read in exif_process_IFD_in_MAKERNOTE
1688934 - CVE-2019-9639 php: Uninitialized read in exif_process_IFD_in_MAKERNOTE
1688939 - CVE-2019-9640 php: Invalid read in exif_process_SOFn()
1702246 - CVE-2019-11035 php: Heap buffer overflow in function exif_iif_add_value()
1702256 - CVE-2019-11034 php: Heap buffer overflow in function exif_process_IFD_TAG()
1707299 - CVE-2019-11036 php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure
1724149 - CVE-2019-11038 gd: Information disclosure in gdImageCreateFromXbm()
1724152 - CVE-2019-11039 php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers()
1724154 - CVE-2019-11040 php: Buffer over-read in exif_read_data()

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-php71-php-7.1.30-1.el7.src.rpm

aarch64:
rh-php71-php-7.1.30-1.el7.aarch64.rpm
rh-php71-php-bcmath-7.1.30-1.el7.aarch64.rpm
rh-php71-php-cli-7.1.30-1.el7.aarch64.rpm
rh-php71-php-common-7.1.30-1.el7.aarch64.rpm
rh-php71-php-dba-7.1.30-1.el7.aarch64.rpm
rh-php71-php-dbg-7.1.30-1.el7.aarch64.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.aarch64.rpm
rh-php71-php-devel-7.1.30-1.el7.aarch64.rpm
rh-php71-php-embedded-7.1.30-1.el7.aarch64.rpm
rh-php71-php-enchant-7.1.30-1.el7.aarch64.rpm
rh-php71-php-fpm-7.1.30-1.el7.aarch64.rpm
rh-php71-php-gd-7.1.30-1.el7.aarch64.rpm
rh-php71-php-gmp-7.1.30-1.el7.aarch64.rpm
rh-php71-php-intl-7.1.30-1.el7.aarch64.rpm
rh-php71-php-json-7.1.30-1.el7.aarch64.rpm
rh-php71-php-ldap-7.1.30-1.el7.aarch64.rpm
rh-php71-php-mbstring-7.1.30-1.el7.aarch64.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.aarch64.rpm
rh-php71-php-odbc-7.1.30-1.el7.aarch64.rpm
rh-php71-php-opcache-7.1.30-1.el7.aarch64.rpm
rh-php71-php-pdo-7.1.30-1.el7.aarch64.rpm
rh-php71-php-pgsql-7.1.30-1.el7.aarch64.rpm
rh-php71-php-process-7.1.30-1.el7.aarch64.rpm
rh-php71-php-pspell-7.1.30-1.el7.aarch64.rpm
rh-php71-php-recode-7.1.30-1.el7.aarch64.rpm
rh-php71-php-snmp-7.1.30-1.el7.aarch64.rpm
rh-php71-php-soap-7.1.30-1.el7.aarch64.rpm
rh-php71-php-xml-7.1.30-1.el7.aarch64.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.aarch64.rpm
rh-php71-php-zip-7.1.30-1.el7.aarch64.rpm

ppc64le:
rh-php71-php-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-bcmath-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-cli-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-common-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dba-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dbg-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-devel-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-embedded-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-enchant-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-fpm-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-intl-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-json-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-ldap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mbstring-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-odbc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-opcache-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pdo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pgsql-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-process-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pspell-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-recode-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-snmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-soap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xml-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-zip-7.1.30-1.el7.ppc64le.rpm

s390x:
rh-php71-php-7.1.30-1.el7.s390x.rpm
rh-php71-php-bcmath-7.1.30-1.el7.s390x.rpm
rh-php71-php-cli-7.1.30-1.el7.s390x.rpm
rh-php71-php-common-7.1.30-1.el7.s390x.rpm
rh-php71-php-dba-7.1.30-1.el7.s390x.rpm
rh-php71-php-dbg-7.1.30-1.el7.s390x.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.s390x.rpm
rh-php71-php-devel-7.1.30-1.el7.s390x.rpm
rh-php71-php-embedded-7.1.30-1.el7.s390x.rpm
rh-php71-php-enchant-7.1.30-1.el7.s390x.rpm
rh-php71-php-fpm-7.1.30-1.el7.s390x.rpm
rh-php71-php-gd-7.1.30-1.el7.s390x.rpm
rh-php71-php-gmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-intl-7.1.30-1.el7.s390x.rpm
rh-php71-php-json-7.1.30-1.el7.s390x.rpm
rh-php71-php-ldap-7.1.30-1.el7.s390x.rpm
rh-php71-php-mbstring-7.1.30-1.el7.s390x.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.s390x.rpm
rh-php71-php-odbc-7.1.30-1.el7.s390x.rpm
rh-php71-php-opcache-7.1.30-1.el7.s390x.rpm
rh-php71-php-pdo-7.1.30-1.el7.s390x.rpm
rh-php71-php-pgsql-7.1.30-1.el7.s390x.rpm
rh-php71-php-process-7.1.30-1.el7.s390x.rpm
rh-php71-php-pspell-7.1.30-1.el7.s390x.rpm
rh-php71-php-recode-7.1.30-1.el7.s390x.rpm
rh-php71-php-snmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-soap-7.1.30-1.el7.s390x.rpm
rh-php71-php-xml-7.1.30-1.el7.s390x.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.s390x.rpm
rh-php71-php-zip-7.1.30-1.el7.s390x.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-php71-php-7.1.30-1.el7.src.rpm

aarch64:
rh-php71-php-7.1.30-1.el7.aarch64.rpm
rh-php71-php-bcmath-7.1.30-1.el7.aarch64.rpm
rh-php71-php-cli-7.1.30-1.el7.aarch64.rpm
rh-php71-php-common-7.1.30-1.el7.aarch64.rpm
rh-php71-php-dba-7.1.30-1.el7.aarch64.rpm
rh-php71-php-dbg-7.1.30-1.el7.aarch64.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.aarch64.rpm
rh-php71-php-devel-7.1.30-1.el7.aarch64.rpm
rh-php71-php-embedded-7.1.30-1.el7.aarch64.rpm
rh-php71-php-enchant-7.1.30-1.el7.aarch64.rpm
rh-php71-php-fpm-7.1.30-1.el7.aarch64.rpm
rh-php71-php-gd-7.1.30-1.el7.aarch64.rpm
rh-php71-php-gmp-7.1.30-1.el7.aarch64.rpm
rh-php71-php-intl-7.1.30-1.el7.aarch64.rpm
rh-php71-php-json-7.1.30-1.el7.aarch64.rpm
rh-php71-php-ldap-7.1.30-1.el7.aarch64.rpm
rh-php71-php-mbstring-7.1.30-1.el7.aarch64.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.aarch64.rpm
rh-php71-php-odbc-7.1.30-1.el7.aarch64.rpm
rh-php71-php-opcache-7.1.30-1.el7.aarch64.rpm
rh-php71-php-pdo-7.1.30-1.el7.aarch64.rpm
rh-php71-php-pgsql-7.1.30-1.el7.aarch64.rpm
rh-php71-php-process-7.1.30-1.el7.aarch64.rpm
rh-php71-php-pspell-7.1.30-1.el7.aarch64.rpm
rh-php71-php-recode-7.1.30-1.el7.aarch64.rpm
rh-php71-php-snmp-7.1.30-1.el7.aarch64.rpm
rh-php71-php-soap-7.1.30-1.el7.aarch64.rpm
rh-php71-php-xml-7.1.30-1.el7.aarch64.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.aarch64.rpm
rh-php71-php-zip-7.1.30-1.el7.aarch64.rpm

ppc64le:
rh-php71-php-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-bcmath-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-cli-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-common-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dba-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dbg-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-devel-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-embedded-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-enchant-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-fpm-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-intl-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-json-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-ldap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mbstring-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-odbc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-opcache-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pdo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pgsql-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-process-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pspell-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-recode-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-snmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-soap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xml-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-zip-7.1.30-1.el7.ppc64le.rpm

s390x:
rh-php71-php-7.1.30-1.el7.s390x.rpm
rh-php71-php-bcmath-7.1.30-1.el7.s390x.rpm
rh-php71-php-cli-7.1.30-1.el7.s390x.rpm
rh-php71-php-common-7.1.30-1.el7.s390x.rpm
rh-php71-php-dba-7.1.30-1.el7.s390x.rpm
rh-php71-php-dbg-7.1.30-1.el7.s390x.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.s390x.rpm
rh-php71-php-devel-7.1.30-1.el7.s390x.rpm
rh-php71-php-embedded-7.1.30-1.el7.s390x.rpm
rh-php71-php-enchant-7.1.30-1.el7.s390x.rpm
rh-php71-php-fpm-7.1.30-1.el7.s390x.rpm
rh-php71-php-gd-7.1.30-1.el7.s390x.rpm
rh-php71-php-gmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-intl-7.1.30-1.el7.s390x.rpm
rh-php71-php-json-7.1.30-1.el7.s390x.rpm
rh-php71-php-ldap-7.1.30-1.el7.s390x.rpm
rh-php71-php-mbstring-7.1.30-1.el7.s390x.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.s390x.rpm
rh-php71-php-odbc-7.1.30-1.el7.s390x.rpm
rh-php71-php-opcache-7.1.30-1.el7.s390x.rpm
rh-php71-php-pdo-7.1.30-1.el7.s390x.rpm
rh-php71-php-pgsql-7.1.30-1.el7.s390x.rpm
rh-php71-php-process-7.1.30-1.el7.s390x.rpm
rh-php71-php-pspell-7.1.30-1.el7.s390x.rpm
rh-php71-php-recode-7.1.30-1.el7.s390x.rpm
rh-php71-php-snmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-soap-7.1.30-1.el7.s390x.rpm
rh-php71-php-xml-7.1.30-1.el7.s390x.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.s390x.rpm
rh-php71-php-zip-7.1.30-1.el7.s390x.rpm

x86_64:
rh-php71-php-7.1.30-1.el7.x86_64.rpm
rh-php71-php-bcmath-7.1.30-1.el7.x86_64.rpm
rh-php71-php-cli-7.1.30-1.el7.x86_64.rpm
rh-php71-php-common-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dba-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dbg-7.1.30-1.el7.x86_64.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-devel-7.1.30-1.el7.x86_64.rpm
rh-php71-php-embedded-7.1.30-1.el7.x86_64.rpm
rh-php71-php-enchant-7.1.30-1.el7.x86_64.rpm
rh-php71-php-fpm-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-intl-7.1.30-1.el7.x86_64.rpm
rh-php71-php-json-7.1.30-1.el7.x86_64.rpm
rh-php71-php-ldap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mbstring-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-odbc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-opcache-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pdo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pgsql-7.1.30-1.el7.x86_64.rpm
rh-php71-php-process-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pspell-7.1.30-1.el7.x86_64.rpm
rh-php71-php-recode-7.1.30-1.el7.x86_64.rpm
rh-php71-php-snmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-soap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xml-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-zip-7.1.30-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):

Source:
rh-php71-php-7.1.30-1.el7.src.rpm

ppc64le:
rh-php71-php-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-bcmath-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-cli-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-common-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dba-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dbg-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-devel-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-embedded-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-enchant-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-fpm-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-intl-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-json-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-ldap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mbstring-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-odbc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-opcache-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pdo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pgsql-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-process-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pspell-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-recode-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-snmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-soap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xml-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-zip-7.1.30-1.el7.ppc64le.rpm

s390x:
rh-php71-php-7.1.30-1.el7.s390x.rpm
rh-php71-php-bcmath-7.1.30-1.el7.s390x.rpm
rh-php71-php-cli-7.1.30-1.el7.s390x.rpm
rh-php71-php-common-7.1.30-1.el7.s390x.rpm
rh-php71-php-dba-7.1.30-1.el7.s390x.rpm
rh-php71-php-dbg-7.1.30-1.el7.s390x.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.s390x.rpm
rh-php71-php-devel-7.1.30-1.el7.s390x.rpm
rh-php71-php-embedded-7.1.30-1.el7.s390x.rpm
rh-php71-php-enchant-7.1.30-1.el7.s390x.rpm
rh-php71-php-fpm-7.1.30-1.el7.s390x.rpm
rh-php71-php-gd-7.1.30-1.el7.s390x.rpm
rh-php71-php-gmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-intl-7.1.30-1.el7.s390x.rpm
rh-php71-php-json-7.1.30-1.el7.s390x.rpm
rh-php71-php-ldap-7.1.30-1.el7.s390x.rpm
rh-php71-php-mbstring-7.1.30-1.el7.s390x.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.s390x.rpm
rh-php71-php-odbc-7.1.30-1.el7.s390x.rpm
rh-php71-php-opcache-7.1.30-1.el7.s390x.rpm
rh-php71-php-pdo-7.1.30-1.el7.s390x.rpm
rh-php71-php-pgsql-7.1.30-1.el7.s390x.rpm
rh-php71-php-process-7.1.30-1.el7.s390x.rpm
rh-php71-php-pspell-7.1.30-1.el7.s390x.rpm
rh-php71-php-recode-7.1.30-1.el7.s390x.rpm
rh-php71-php-snmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-soap-7.1.30-1.el7.s390x.rpm
rh-php71-php-xml-7.1.30-1.el7.s390x.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.s390x.rpm
rh-php71-php-zip-7.1.30-1.el7.s390x.rpm

x86_64:
rh-php71-php-7.1.30-1.el7.x86_64.rpm
rh-php71-php-bcmath-7.1.30-1.el7.x86_64.rpm
rh-php71-php-cli-7.1.30-1.el7.x86_64.rpm
rh-php71-php-common-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dba-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dbg-7.1.30-1.el7.x86_64.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-devel-7.1.30-1.el7.x86_64.rpm
rh-php71-php-embedded-7.1.30-1.el7.x86_64.rpm
rh-php71-php-enchant-7.1.30-1.el7.x86_64.rpm
rh-php71-php-fpm-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-intl-7.1.30-1.el7.x86_64.rpm
rh-php71-php-json-7.1.30-1.el7.x86_64.rpm
rh-php71-php-ldap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mbstring-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-odbc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-opcache-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pdo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pgsql-7.1.30-1.el7.x86_64.rpm
rh-php71-php-process-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pspell-7.1.30-1.el7.x86_64.rpm
rh-php71-php-recode-7.1.30-1.el7.x86_64.rpm
rh-php71-php-snmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-soap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xml-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-zip-7.1.30-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):

Source:
rh-php71-php-7.1.30-1.el7.src.rpm

ppc64le:
rh-php71-php-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-bcmath-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-cli-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-common-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dba-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dbg-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-devel-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-embedded-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-enchant-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-fpm-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-intl-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-json-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-ldap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mbstring-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-odbc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-opcache-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pdo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pgsql-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-process-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pspell-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-recode-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-snmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-soap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xml-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-zip-7.1.30-1.el7.ppc64le.rpm

s390x:
rh-php71-php-7.1.30-1.el7.s390x.rpm
rh-php71-php-bcmath-7.1.30-1.el7.s390x.rpm
rh-php71-php-cli-7.1.30-1.el7.s390x.rpm
rh-php71-php-common-7.1.30-1.el7.s390x.rpm
rh-php71-php-dba-7.1.30-1.el7.s390x.rpm
rh-php71-php-dbg-7.1.30-1.el7.s390x.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.s390x.rpm
rh-php71-php-devel-7.1.30-1.el7.s390x.rpm
rh-php71-php-embedded-7.1.30-1.el7.s390x.rpm
rh-php71-php-enchant-7.1.30-1.el7.s390x.rpm
rh-php71-php-fpm-7.1.30-1.el7.s390x.rpm
rh-php71-php-gd-7.1.30-1.el7.s390x.rpm
rh-php71-php-gmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-intl-7.1.30-1.el7.s390x.rpm
rh-php71-php-json-7.1.30-1.el7.s390x.rpm
rh-php71-php-ldap-7.1.30-1.el7.s390x.rpm
rh-php71-php-mbstring-7.1.30-1.el7.s390x.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.s390x.rpm
rh-php71-php-odbc-7.1.30-1.el7.s390x.rpm
rh-php71-php-opcache-7.1.30-1.el7.s390x.rpm
rh-php71-php-pdo-7.1.30-1.el7.s390x.rpm
rh-php71-php-pgsql-7.1.30-1.el7.s390x.rpm
rh-php71-php-process-7.1.30-1.el7.s390x.rpm
rh-php71-php-pspell-7.1.30-1.el7.s390x.rpm
rh-php71-php-recode-7.1.30-1.el7.s390x.rpm
rh-php71-php-snmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-soap-7.1.30-1.el7.s390x.rpm
rh-php71-php-xml-7.1.30-1.el7.s390x.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.s390x.rpm
rh-php71-php-zip-7.1.30-1.el7.s390x.rpm

x86_64:
rh-php71-php-7.1.30-1.el7.x86_64.rpm
rh-php71-php-bcmath-7.1.30-1.el7.x86_64.rpm
rh-php71-php-cli-7.1.30-1.el7.x86_64.rpm
rh-php71-php-common-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dba-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dbg-7.1.30-1.el7.x86_64.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-devel-7.1.30-1.el7.x86_64.rpm
rh-php71-php-embedded-7.1.30-1.el7.x86_64.rpm
rh-php71-php-enchant-7.1.30-1.el7.x86_64.rpm
rh-php71-php-fpm-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-intl-7.1.30-1.el7.x86_64.rpm
rh-php71-php-json-7.1.30-1.el7.x86_64.rpm
rh-php71-php-ldap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mbstring-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-odbc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-opcache-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pdo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pgsql-7.1.30-1.el7.x86_64.rpm
rh-php71-php-process-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pspell-7.1.30-1.el7.x86_64.rpm
rh-php71-php-recode-7.1.30-1.el7.x86_64.rpm
rh-php71-php-snmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-soap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xml-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-zip-7.1.30-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
rh-php71-php-7.1.30-1.el7.src.rpm

ppc64le:
rh-php71-php-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-bcmath-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-cli-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-common-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dba-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-dbg-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-devel-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-embedded-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-enchant-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-fpm-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-gmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-intl-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-json-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-ldap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mbstring-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-odbc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-opcache-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pdo-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pgsql-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-process-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-pspell-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-recode-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-snmp-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-soap-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xml-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.ppc64le.rpm
rh-php71-php-zip-7.1.30-1.el7.ppc64le.rpm

s390x:
rh-php71-php-7.1.30-1.el7.s390x.rpm
rh-php71-php-bcmath-7.1.30-1.el7.s390x.rpm
rh-php71-php-cli-7.1.30-1.el7.s390x.rpm
rh-php71-php-common-7.1.30-1.el7.s390x.rpm
rh-php71-php-dba-7.1.30-1.el7.s390x.rpm
rh-php71-php-dbg-7.1.30-1.el7.s390x.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.s390x.rpm
rh-php71-php-devel-7.1.30-1.el7.s390x.rpm
rh-php71-php-embedded-7.1.30-1.el7.s390x.rpm
rh-php71-php-enchant-7.1.30-1.el7.s390x.rpm
rh-php71-php-fpm-7.1.30-1.el7.s390x.rpm
rh-php71-php-gd-7.1.30-1.el7.s390x.rpm
rh-php71-php-gmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-intl-7.1.30-1.el7.s390x.rpm
rh-php71-php-json-7.1.30-1.el7.s390x.rpm
rh-php71-php-ldap-7.1.30-1.el7.s390x.rpm
rh-php71-php-mbstring-7.1.30-1.el7.s390x.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.s390x.rpm
rh-php71-php-odbc-7.1.30-1.el7.s390x.rpm
rh-php71-php-opcache-7.1.30-1.el7.s390x.rpm
rh-php71-php-pdo-7.1.30-1.el7.s390x.rpm
rh-php71-php-pgsql-7.1.30-1.el7.s390x.rpm
rh-php71-php-process-7.1.30-1.el7.s390x.rpm
rh-php71-php-pspell-7.1.30-1.el7.s390x.rpm
rh-php71-php-recode-7.1.30-1.el7.s390x.rpm
rh-php71-php-snmp-7.1.30-1.el7.s390x.rpm
rh-php71-php-soap-7.1.30-1.el7.s390x.rpm
rh-php71-php-xml-7.1.30-1.el7.s390x.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.s390x.rpm
rh-php71-php-zip-7.1.30-1.el7.s390x.rpm

x86_64:
rh-php71-php-7.1.30-1.el7.x86_64.rpm
rh-php71-php-bcmath-7.1.30-1.el7.x86_64.rpm
rh-php71-php-cli-7.1.30-1.el7.x86_64.rpm
rh-php71-php-common-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dba-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dbg-7.1.30-1.el7.x86_64.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-devel-7.1.30-1.el7.x86_64.rpm
rh-php71-php-embedded-7.1.30-1.el7.x86_64.rpm
rh-php71-php-enchant-7.1.30-1.el7.x86_64.rpm
rh-php71-php-fpm-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-intl-7.1.30-1.el7.x86_64.rpm
rh-php71-php-json-7.1.30-1.el7.x86_64.rpm
rh-php71-php-ldap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mbstring-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-odbc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-opcache-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pdo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pgsql-7.1.30-1.el7.x86_64.rpm
rh-php71-php-process-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pspell-7.1.30-1.el7.x86_64.rpm
rh-php71-php-recode-7.1.30-1.el7.x86_64.rpm
rh-php71-php-snmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-soap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xml-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-zip-7.1.30-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-php71-php-7.1.30-1.el7.src.rpm

x86_64:
rh-php71-php-7.1.30-1.el7.x86_64.rpm
rh-php71-php-bcmath-7.1.30-1.el7.x86_64.rpm
rh-php71-php-cli-7.1.30-1.el7.x86_64.rpm
rh-php71-php-common-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dba-7.1.30-1.el7.x86_64.rpm
rh-php71-php-dbg-7.1.30-1.el7.x86_64.rpm
rh-php71-php-debuginfo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-devel-7.1.30-1.el7.x86_64.rpm
rh-php71-php-embedded-7.1.30-1.el7.x86_64.rpm
rh-php71-php-enchant-7.1.30-1.el7.x86_64.rpm
rh-php71-php-fpm-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-gmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-intl-7.1.30-1.el7.x86_64.rpm
rh-php71-php-json-7.1.30-1.el7.x86_64.rpm
rh-php71-php-ldap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mbstring-7.1.30-1.el7.x86_64.rpm
rh-php71-php-mysqlnd-7.1.30-1.el7.x86_64.rpm
rh-php71-php-odbc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-opcache-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pdo-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pgsql-7.1.30-1.el7.x86_64.rpm
rh-php71-php-process-7.1.30-1.el7.x86_64.rpm
rh-php71-php-pspell-7.1.30-1.el7.x86_64.rpm
rh-php71-php-recode-7.1.30-1.el7.x86_64.rpm
rh-php71-php-snmp-7.1.30-1.el7.x86_64.rpm
rh-php71-php-soap-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xml-7.1.30-1.el7.x86_64.rpm
rh-php71-php-xmlrpc-7.1.30-1.el7.x86_64.rpm
rh-php71-php-zip-7.1.30-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-10166
https://access.redhat.com/security/cve/CVE-2017-9118
https://access.redhat.com/security/cve/CVE-2017-9120
https://access.redhat.com/security/cve/CVE-2017-12932
https://access.redhat.com/security/cve/CVE-2017-16642
https://access.redhat.com/security/cve/CVE-2018-5711
https://access.redhat.com/security/cve/CVE-2018-5712
https://access.redhat.com/security/cve/CVE-2018-7584
https://access.redhat.com/security/cve/CVE-2018-10545
https://access.redhat.com/security/cve/CVE-2018-10546
https://access.redhat.com/security/cve/CVE-2018-10547
https://access.redhat.com/security/cve/CVE-2018-10548
https://access.redhat.com/security/cve/CVE-2018-10549
https://access.redhat.com/security/cve/CVE-2018-14851
https://access.redhat.com/security/cve/CVE-2018-14884
https://access.redhat.com/security/cve/CVE-2018-17082
https://access.redhat.com/security/cve/CVE-2018-20783
https://access.redhat.com/security/cve/CVE-2019-6977
https://access.redhat.com/security/cve/CVE-2019-9020
https://access.redhat.com/security/cve/CVE-2019-9021
https://access.redhat.com/security/cve/CVE-2019-9022
https://access.redhat.com/security/cve/CVE-2019-9023
https://access.redhat.com/security/cve/CVE-2019-9024
https://access.redhat.com/security/cve/CVE-2019-9637
https://access.redhat.com/security/cve/CVE-2019-9638
https://access.redhat.com/security/cve/CVE-2019-9639
https://access.redhat.com/security/cve/CVE-2019-9640
https://access.redhat.com/security/cve/CVE-2019-11034
https://access.redhat.com/security/cve/CVE-2019-11035
https://access.redhat.com/security/cve/CVE-2019-11036
https://access.redhat.com/security/cve/CVE-2019-11038
https://access.redhat.com/security/cve/CVE-2019-11039
https://access.redhat.com/security/cve/CVE-2019-11040
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=5r/F
- -----END PGP SIGNATURE-----

- --
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=PE53
-----END PGP SIGNATURE-----