ALT-PU-2022-6472-1
Package php7-gd updated to version 7.4.32-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-03725
Уязвимость функции mysqlnd/pdo (mysqlnd_wireprotocol.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
BDU:2022-05351
Уязвимость функции pg_query_params() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-31625
In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
- https://bugs.php.net/bug.php?id=81720
- https://bugs.php.net/bug.php?id=81720
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- FEDORA-2022-f3fc52428e
- FEDORA-2022-f3fc52428e
- FEDORA-2022-0a96e5b9b1
- FEDORA-2022-0a96e5b9b1
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20220722-0005/
- https://security.netapp.com/advisory/ntap-20220722-0005/
- DSA-5179
- DSA-5179
Modified: 2024-11-21
CVE-2022-31626
In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.
- https://bugs.php.net/bug.php?id=81719
- https://bugs.php.net/bug.php?id=81719
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- FEDORA-2022-f3fc52428e
- FEDORA-2022-f3fc52428e
- FEDORA-2022-0a96e5b9b1
- FEDORA-2022-0a96e5b9b1
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20220722-0005/
- https://security.netapp.com/advisory/ntap-20220722-0005/
- DSA-5179
- DSA-5179
Modified: 2024-11-21
CVE-2022-31628
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
- https://bugs.php.net/bug.php?id=81726
- https://bugs.php.net/bug.php?id=81726
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- FEDORA-2022-f204e1d0ed
- FEDORA-2022-f204e1d0ed
- FEDORA-2022-afdea1c747
- FEDORA-2022-afdea1c747
- FEDORA-2022-0b77fbd9e7
- FEDORA-2022-0b77fbd9e7
- GLSA-202211-03
- GLSA-202211-03
- https://security.netapp.com/advisory/ntap-20221209-0001/
- https://security.netapp.com/advisory/ntap-20221209-0001/
- DSA-5277
- DSA-5277
Modified: 2024-11-21
CVE-2022-31629
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
- [oss-security] 20240412 PHP security releases 8.1.28, 8.2.18, & 8.3.6
- [oss-security] 20240412 PHP security releases 8.1.28, 8.2.18, & 8.3.6
- https://bugs.php.net/bug.php?id=81727
- https://bugs.php.net/bug.php?id=81727
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- FEDORA-2022-f204e1d0ed
- FEDORA-2022-f204e1d0ed
- FEDORA-2024-5e8ae0def0
- FEDORA-2024-5e8ae0def0
- FEDORA-2024-39d50cc975
- FEDORA-2024-39d50cc975
- FEDORA-2022-afdea1c747
- FEDORA-2022-afdea1c747
- FEDORA-2022-0b77fbd9e7
- FEDORA-2022-0b77fbd9e7
- FEDORA-2024-b46619f761
- FEDORA-2024-b46619f761
- GLSA-202211-03
- GLSA-202211-03
- https://security.netapp.com/advisory/ntap-20221209-0001/
- https://security.netapp.com/advisory/ntap-20221209-0001/
- DSA-5277
- DSA-5277