Bug 55503 - php7.3: Multiple issues (5.0)
php7.3: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-2-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-12-19 07:56 CET by Quality Assurance
Modified: 2022-12-21 20:23 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2022-12-19 07:56:28 CET
New Debian php7.3 7.3.31-1~deb10u2 fixes:
This update addresses the following issues:
* Special character breaks path in xml parsing (CVE-2021-21707)
* Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
* password of excessive length triggers buffer overflow leading to RCE  (CVE-2022-31626)
* phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)
* standard insecure cookie could be treated as a `__Host-` or `__Secure-`  cookie by PHP applications (CVE-2022-31629)
* buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
Comment 1 Quality Assurance univentionstaff 2022-12-19 08:00:18 CET
--- mirror/ftp/pool/main/p/php7.3/php7.3_7.3.31-1~deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-2/source/php7.3_7.3.31-1~deb10u2.dsc
@@ -1,3 +1,13 @@
+7.3.31-1~deb10u2 [Thu, 15 Dec 2022 10:39:10 +0100] Emilio Pozuelo Monfort <pochu@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2021-21707: invalid parsing of encoded null character.
+  * CVE-2022-31625: invalid free in posgresql extension.
+  * CVE-2022-31626: buffer overflow in mysqlnd driver.
+  * CVE-2022-31628: infinite loop in the phar uncompressor.
+  * CVE-2022-31629: secure cookie poisoning.
+  * CVE-2022-37454: buffer overflow in Keccak XKCP SHA-3.
+
 7.3.31-1~deb10u1 [Sun, 24 Oct 2021 17:18:08 +0200] Ondřej Surý <ondrej@debian.org>:
 
   * New upstream version 7.3.31

<http://piuparts.knut.univention.de/5.0-2/#9052518499942537158>
Comment 2 Philipp Hahn univentionstaff 2022-12-21 17:13:26 CET
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-2] 85f360e4a0 Bug #55503: php7.3 7.3.31-1~deb10u2
 doc/errata/staging/php7.3.yaml | 13 +++++++------
 1 file changed, 7 insertions(+), 6 deletions(-)

[5.0-2] cc6aa9cac8 Bug #55503: php7.3 7.3.31-1~deb10u2
 doc/errata/staging/php7.3.yaml | 24 ++++++++++++++++++++++++
 1 file changed, 24 insertions(+)