Univention Bugzilla – Bug 55503
php7.3: Multiple issues (5.0)
Last modified: 2022-12-21 20:23:39 CET
New Debian php7.3 7.3.31-1~deb10u2 fixes: This update addresses the following issues: * Special character breaks path in xml parsing (CVE-2021-21707) * Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) * password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) * phar wrapper can occur dos when using quine gzip file (CVE-2022-31628) * standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629) * buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
--- mirror/ftp/pool/main/p/php7.3/php7.3_7.3.31-1~deb10u1.dsc +++ apt/ucs_5.0-0-errata5.0-2/source/php7.3_7.3.31-1~deb10u2.dsc @@ -1,3 +1,13 @@ +7.3.31-1~deb10u2 [Thu, 15 Dec 2022 10:39:10 +0100] Emilio Pozuelo Monfort <pochu@debian.org>: + + * Non-maintainer upload by the LTS Team. + * CVE-2021-21707: invalid parsing of encoded null character. + * CVE-2022-31625: invalid free in posgresql extension. + * CVE-2022-31626: buffer overflow in mysqlnd driver. + * CVE-2022-31628: infinite loop in the phar uncompressor. + * CVE-2022-31629: secure cookie poisoning. + * CVE-2022-37454: buffer overflow in Keccak XKCP SHA-3. + 7.3.31-1~deb10u1 [Sun, 24 Oct 2021 17:18:08 +0200] Ondřej Surý <ondrej@debian.org>: * New upstream version 7.3.31 <http://piuparts.knut.univention.de/5.0-2/#9052518499942537158>
OK: bug OK: yaml OK: announce_errata OK: patch OK: piuparts [5.0-2] 85f360e4a0 Bug #55503: php7.3 7.3.31-1~deb10u2 doc/errata/staging/php7.3.yaml | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) [5.0-2] cc6aa9cac8 Bug #55503: php7.3 7.3.31-1~deb10u2 doc/errata/staging/php7.3.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+)
<https://errata.software-univention.de/#/?erratum=5.0x518>