Lucene search

K
osvGoogleOSV:RLSA-2023:0965
HistoryApr 06, 2023 - 3:53 p.m.

Moderate: php security update

2023-04-0615:53:36
Google
osv.dev
15
php
security update
buffer overflow
insecure cookie
oob read
integer overflow
dos
cve-2022-37454
cve-2022-31629
cve-2022-31630
cve-2022-31631
cve-2022-31628

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.031

Percentile

91.2%

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667)

Security Fix(es):

  • XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)

  • php: standard insecure cookie could be treated as a __Host- or __Secure- cookie by PHP applications (CVE-2022-31629)

  • php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)

  • php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)

  • php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.4

Confidence

High

EPSS

0.031

Percentile

91.2%