-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5179-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 08, 2022                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : php7.4
CVE ID         : CVE-2022-31625 CVE-2022-31626

Charles Fol discovered two security issues in PHP, a widely-used open
source general purpose scripting language which could result an denial of
service or potentially the execution of arbitrary code:

CVE-2022-31625

    Incorrect memory handling in the pg_query_params() function.

CVE-2022-31626

    A buffer overflow in the mysqld extension.

For the stable distribution (bullseye), these problems have been fixed in
version 7.4.30-1+deb11u1.

We recommend that you upgrade your php7.4 packages.

For the detailed security status of php7.4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/php7.4

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-5179-1: php7.4 security update

July 8, 2022
Charles Fol discovered two security issues in PHP, a widely-used open source general purpose scripting language which could result an denial of service or potentially the execution...

Summary

Charles Fol discovered two security issues in PHP, a widely-used open
source general purpose scripting language which could result an denial of
service or potentially the execution of arbitrary code:

CVE-2022-31625

Incorrect memory handling in the pg_query_params() function.

CVE-2022-31626

A buffer overflow in the mysqld extension.

For the stable distribution (bullseye), these problems have been fixed in
version 7.4.30-1+deb11u1.

We recommend that you upgrade your php7.4 packages.

For the detailed security status of php7.4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/php7.4

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Package : php7.4
CVE ID : CVE-2022-31625 CVE-2022-31626

Related News