![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2022.0362 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2022-0362) |
Zusammenfassung: | The remote host is missing an update for the 'php' package(s) announced via the MGASA-2022-0362 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'php' package(s) announced via the MGASA-2022-0362 advisory. Vulnerability Insight: Core Fixed bug GH-9323 (Crash in ZEND_RETURN/GC/zend_call_function) Fixed bug GH-9361 (Segmentation fault on script exit #9379). Fixed bug GH-9407 (LSP error in eval'd code refers to wrong class for static type). Fixed bug #81727: Don't mangle HTTP variable names that clash with ones that have a specific semantic meaning. (CVE-2022-31629) DOM Fixed bug #79451 (DOMDocument->replaceChild on doctype causes double free). FPM Fixed bug GH-8885 (FPM access.log with stderr begins to write logs to error_log after daemon reload). Fixed bug #77780 ('Headers already sent...' when previous connection was aborted). GMP Fixed bug GH-9308 (GMP throws the wrong error when a GMP object is passed to gmp_init()). Intl Fixed bug GH-9421 (Incorrect argument number for ValueError in NumberFormatter). Phar Fixed bug #81726: phar wrapper: DOS when using quine gzip file. (CVE-2022-31628) PDO_PGSQL Fixed bug GH-9411 (PgSQL large object resource is incorrectly closed). Reflection Fixed bug GH-8932 (ReflectionFunction provides no way to get the called class of a Closure). Fixed bug GH-9409 (Private method is incorrectly dumped as 'overwrites'). Streams Fixed bug GH-9316 ($http_response_header is wrong for long status line). Affected Software/OS: 'php' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-31628 Debian Security Information: DSA-5277 (Google Search) https://www.debian.org/security/2022/dsa-5277 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNIEABBH5XCXLFWWZYIDE457SPEDZTXV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VI3E6A3ZTH2RP7OMLJHSVFIEQBIFM6RF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2L5SUVYGAKSWODUQPZFBUB3AL6E6CSEV/ https://security.gentoo.org/glsa/202211-03 https://bugs.php.net/bug.php?id=81726 https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html Common Vulnerability Exposure (CVE) ID: CVE-2022-31629 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSJVPJTX7T3J5V7XHR4MFNHZGP44R5XE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/ https://bugs.php.net/bug.php?id=81727 http://www.openwall.com/lists/oss-security/2024/04/12/11 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |