Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2022.0362
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2022-0362)
Zusammenfassung:The remote host is missing an update for the 'php' package(s) announced via the MGASA-2022-0362 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'php' package(s) announced via the MGASA-2022-0362 advisory.

Vulnerability Insight:
Core
Fixed bug GH-9323 (Crash in ZEND_RETURN/GC/zend_call_function)
Fixed bug GH-9361 (Segmentation fault on script exit #9379).
Fixed bug GH-9407 (LSP error in eval'd code refers to wrong class for
static type).
Fixed bug #81727: Don't mangle HTTP variable names that clash with ones
that have a specific semantic meaning. (CVE-2022-31629)

DOM
Fixed bug #79451 (DOMDocument->replaceChild on doctype causes double
free).

FPM
Fixed bug GH-8885 (FPM access.log with stderr begins to write logs to
error_log after daemon reload).
Fixed bug #77780 ('Headers already sent...' when previous connection was
aborted).

GMP
Fixed bug GH-9308 (GMP throws the wrong error when a GMP object is
passed to gmp_init()).

Intl
Fixed bug GH-9421 (Incorrect argument number for ValueError in
NumberFormatter).

Phar
Fixed bug #81726: phar wrapper: DOS when using quine gzip file.
(CVE-2022-31628)

PDO_PGSQL
Fixed bug GH-9411 (PgSQL large object resource is incorrectly closed).

Reflection
Fixed bug GH-8932 (ReflectionFunction provides no way to get the called
class of a Closure).
Fixed bug GH-9409 (Private method is incorrectly dumped as
'overwrites').

Streams
Fixed bug GH-9316 ($http_response_header is wrong for long status line).

Affected Software/OS:
'php' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:C/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-31628
Debian Security Information: DSA-5277 (Google Search)
https://www.debian.org/security/2022/dsa-5277
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNIEABBH5XCXLFWWZYIDE457SPEDZTXV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VI3E6A3ZTH2RP7OMLJHSVFIEQBIFM6RF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2L5SUVYGAKSWODUQPZFBUB3AL6E6CSEV/
https://security.gentoo.org/glsa/202211-03
https://bugs.php.net/bug.php?id=81726
https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-31629
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSJVPJTX7T3J5V7XHR4MFNHZGP44R5XE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/
https://bugs.php.net/bug.php?id=81727
http://www.openwall.com/lists/oss-security/2024/04/12/11
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.