Debian LTS: DLA-3555-1: php7.3 security update
Summary
CVE-2023-3823
Various XML functions rely on libxml global state to track
configuration variables, like whether external entities are loaded.
This state is assumed to be unchanged unless the user explicitly
changes it by calling appropriate function. Joas Schilling and
Baptista Katapi discovered that, since the state is process-global,
other modules â such as ImageMagick â may also use this library
within the same process and change that global state for their
internal purposes, and leave it in a state where external entities
loading is enabled. This can lead to the situation where external
XML is parsed with external entities loaded, which can lead to
disclosure of any local files accessible to PHP. This vulnerable
state may persist in the same process across many requests, until
the process is shut down.
CVE-2023-3824
Niels Dossche discovered that when loading a Phar file, while
reading PHAR directory entries, insufficient length checking may
lead to a stack buffer overflow, leading potentially to memory
corruption or RCE.
For Debian 10 buster, these problems have been fixed in version
7.3.31-1~deb10u5.
We recommend that you upgrade your php7.3 packages.
For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/php7.3
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS