Bug 57270 - php7.3: Multiple issues (5.0)
php7.3: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-7-errata
Assigned To: Quality Assurance
Iván.Delgado
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2024-05-13 10:31 CEST by Quality Assurance
Modified: 2024-05-15 12:32 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) RedHat debian/changelog


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2024-05-13 10:31:25 CEST
New Debian php7.3 7.3.31-1~deb10u6 fixes:
This update addresses the following issues:
7.3.31-1~deb10u6 (Tue, 07 May 2024 02:47:26 +0200)
* Non-maintainer upload by the LTS Security Team.
* Fix CVE-2024-2756: Due to an incomplete fix to CVE-2022-31629, network and  same-site attackers can set a standard insecure cookie in the victim's  browser which is treated as a __Host- or __Secure- cookie by PHP  applications.
* Fix CVE-2024-3096: If a password stored with password_hash starts with a  null byte (\x00), testing a blank string as the password via  password_verify() will incorrectly return true.
* d/p/CVE-2023-3823.patch: Also backport upstream commit 62228a25685 (a no-op  on Linux.)
Comment 1 Quality Assurance univentionstaff 2024-05-13 11:00:09 CEST
--- mirror/ftp/pool/main/p/php7.3/php7.3_7.3.31-1~deb10u5.dsc
+++ apt/ucs_5.0-0-errata5.0-7/source/php7.3_7.3.31-1~deb10u6.dsc
@@ -1,3 +1,16 @@
+7.3.31-1~deb10u6 [Tue, 07 May 2024 02:47:26 +0200] Guilhem Moulin <guilhem@debian.org>:
+
+  * Non-maintainer upload by the LTS Security Team.
+  * Fix CVE-2024-2756: Due to an incomplete fix to CVE-2022-31629, network and
+    same-site attackers can set a standard insecure cookie in the victim's
+    browser which is treated as a __Host- or __Secure- cookie by PHP
+    applications.
+  * Fix CVE-2024-3096: If a password stored with password_hash starts with a
+    null byte (\x00), testing a blank string as the password via
+    password_verify() will incorrectly return true.
+  * d/p/CVE-2023-3823.patch: Also backport upstream commit 62228a25685 (a
+    no-op on Linux.)
+
 7.3.31-1~deb10u5 [Mon, 04 Sep 2023 23:49:25 +0200] Guilhem Moulin <guilhem@debian.org>:
 
   * Non-maintainer upload by the LTS Security Team.

<http://piuparts.knut.univention.de/5.0-7/#5206778524850699013>
Comment 2 Iván.Delgado univentionstaff 2024-05-14 12:40:40 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-7] bfe6c0fd06 Bug #57270: php7.3 7.3.31-1~deb10u6
 doc/errata/staging/php7.3.yaml | 26 ++++++++++++++++----------
 1 file changed, 16 insertions(+), 10 deletions(-)

[5.0-7] aaa935b280 Bug #57270: php7.3 7.3.31-1~deb10u6
 doc/errata/staging/php7.3.yaml | 25 +++++++++++++++++++++++++
 1 file changed, 25 insertions(+)
Comment 3 Christian Castens univentionstaff 2024-05-15 12:32:15 CEST
<https://errata.software-univention.de/#/?erratum=5.0x1045>