Bug 55759 - php7.3: Multiple issues (5.0)
php7.3: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-3-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2023-02-27 10:26 CET by Quality Assurance
Modified: 2023-03-01 14:55 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2023-02-27 10:26:08 CET
New Debian php7.3 7.3.31-1~deb10u3 fixes:
This update addresses the following issues:
* PDO::quote() may return unquoted string due to an integer overflow  (CVE-2022-31631)
* Password_verify() always return true with some hash (CVE-2023-0567)
* 1-byte array overrun in common path resolve code (CVE-2023-0568)
* DoS vulnerability when parsing multipart request body (CVE-2023-0662)
Comment 1 Quality Assurance univentionstaff 2023-02-27 11:00:12 CET
--- mirror/ftp/pool/main/p/php7.3/php7.3_7.3.31-1~deb10u2.dsc
+++ apt/ucs_5.0-0-errata5.0-3/source/php7.3_7.3.31-1~deb10u3.dsc
@@ -1,3 +1,15 @@
+7.3.31-1~deb10u3 [Sun, 26 Feb 2023 14:00:55 +0100] Guilhem Moulin <guilhem@debian.org>:
+
+  * Non-maintainer upload by the LTS Security Team.
+  * CVE-2022-31631: Uncaught integer overflow.
+  * CVE-2023-0567: Malformatted BCrypt hashes that include a `$` within their
+    salt part trigger a buffer overread and may erroneously validate any
+    password as valid (closes: #1031368).
+  * CVE-2023-0568: 1-byte array overrun in common path resolve code (closes:
+    #1031368).
+  * CVE-2023-0662: DoS vulnerability when parsing multipart request body
+    (closes: #1031368).
+
 7.3.31-1~deb10u2 [Thu, 15 Dec 2022 10:39:10 +0100] Emilio Pozuelo Monfort <pochu@debian.org>:
 
   * Non-maintainer upload by the LTS Team.

<http://piuparts.knut.univention.de/5.0-3/#9052518499941454633>
Comment 2 Philipp Hahn univentionstaff 2023-03-01 14:01:38 CET
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-3] 5ed4e7ab62 Bug #55759: php7.3 7.3.31-1~deb10u3
 doc/errata/staging/php7.3.yaml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

[5.0-3] b7bc00d9b9 Bug #55759: php7.3 7.3.31-1~deb10u3
 doc/errata/staging/php7.3.yaml | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)