SUSE: 2022:2183-1 important: php72 | LinuxSecurity.com

Advisories


   SUSE Security Update: Security update for php72
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:2183-1
Rating:             important
References:         #1200628 #1200645 
Cross-References:   CVE-2022-31625 CVE-2022-31626
CVSS scores:
                    CVE-2022-31625 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-31626 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise High Performance Computing 12
                    SUSE Linux Enterprise Module for Web Scripting 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP4
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server for SAP Applications 12
                    SUSE Linux Enterprise Server for SAP Applications 12-SP3
                    SUSE Linux Enterprise Server for SAP Applications 12-SP4
                    SUSE Linux Enterprise Server for SAP Applications 12-SP5
                    SUSE Linux Enterprise Software Development Kit 12-SP5
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for php72 fixes the following issues:

   - CVE-2022-31625: Fixed uninitialized pointers free in Postgres extension.
     (bsc#1200645)
   - CVE-2022-31626: Fixed buffer overflow via user-supplied password when
     using pdo_mysql extension with mysqlnd driver. (bsc#1200628)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-2183=1

   - SUSE Linux Enterprise Module for Web Scripting 12:

      zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2022-2183=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      php72-debuginfo-7.2.5-1.81.1
      php72-debugsource-7.2.5-1.81.1
      php72-devel-7.2.5-1.81.1

   - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64):

      apache2-mod_php72-7.2.5-1.81.1
      apache2-mod_php72-debuginfo-7.2.5-1.81.1
      php72-7.2.5-1.81.1
      php72-bcmath-7.2.5-1.81.1
      php72-bcmath-debuginfo-7.2.5-1.81.1
      php72-bz2-7.2.5-1.81.1
      php72-bz2-debuginfo-7.2.5-1.81.1
      php72-calendar-7.2.5-1.81.1
      php72-calendar-debuginfo-7.2.5-1.81.1
      php72-ctype-7.2.5-1.81.1
      php72-ctype-debuginfo-7.2.5-1.81.1
      php72-curl-7.2.5-1.81.1
      php72-curl-debuginfo-7.2.5-1.81.1
      php72-dba-7.2.5-1.81.1
      php72-dba-debuginfo-7.2.5-1.81.1
      php72-debuginfo-7.2.5-1.81.1
      php72-debugsource-7.2.5-1.81.1
      php72-dom-7.2.5-1.81.1
      php72-dom-debuginfo-7.2.5-1.81.1
      php72-enchant-7.2.5-1.81.1
      php72-enchant-debuginfo-7.2.5-1.81.1
      php72-exif-7.2.5-1.81.1
      php72-exif-debuginfo-7.2.5-1.81.1
      php72-fastcgi-7.2.5-1.81.1
      php72-fastcgi-debuginfo-7.2.5-1.81.1
      php72-fileinfo-7.2.5-1.81.1
      php72-fileinfo-debuginfo-7.2.5-1.81.1
      php72-fpm-7.2.5-1.81.1
      php72-fpm-debuginfo-7.2.5-1.81.1
      php72-ftp-7.2.5-1.81.1
      php72-ftp-debuginfo-7.2.5-1.81.1
      php72-gd-7.2.5-1.81.1
      php72-gd-debuginfo-7.2.5-1.81.1
      php72-gettext-7.2.5-1.81.1
      php72-gettext-debuginfo-7.2.5-1.81.1
      php72-gmp-7.2.5-1.81.1
      php72-gmp-debuginfo-7.2.5-1.81.1
      php72-iconv-7.2.5-1.81.1
      php72-iconv-debuginfo-7.2.5-1.81.1
      php72-imap-7.2.5-1.81.1
      php72-imap-debuginfo-7.2.5-1.81.1
      php72-intl-7.2.5-1.81.1
      php72-intl-debuginfo-7.2.5-1.81.1
      php72-json-7.2.5-1.81.1
      php72-json-debuginfo-7.2.5-1.81.1
      php72-ldap-7.2.5-1.81.1
      php72-ldap-debuginfo-7.2.5-1.81.1
      php72-mbstring-7.2.5-1.81.1
      php72-mbstring-debuginfo-7.2.5-1.81.1
      php72-mysql-7.2.5-1.81.1
      php72-mysql-debuginfo-7.2.5-1.81.1
      php72-odbc-7.2.5-1.81.1
      php72-odbc-debuginfo-7.2.5-1.81.1
      php72-opcache-7.2.5-1.81.1
      php72-opcache-debuginfo-7.2.5-1.81.1
      php72-openssl-7.2.5-1.81.1
      php72-openssl-debuginfo-7.2.5-1.81.1
      php72-pcntl-7.2.5-1.81.1
      php72-pcntl-debuginfo-7.2.5-1.81.1
      php72-pdo-7.2.5-1.81.1
      php72-pdo-debuginfo-7.2.5-1.81.1
      php72-pgsql-7.2.5-1.81.1
      php72-pgsql-debuginfo-7.2.5-1.81.1
      php72-phar-7.2.5-1.81.1
      php72-phar-debuginfo-7.2.5-1.81.1
      php72-posix-7.2.5-1.81.1
      php72-posix-debuginfo-7.2.5-1.81.1
      php72-pspell-7.2.5-1.81.1
      php72-pspell-debuginfo-7.2.5-1.81.1
      php72-readline-7.2.5-1.81.1
      php72-readline-debuginfo-7.2.5-1.81.1
      php72-shmop-7.2.5-1.81.1
      php72-shmop-debuginfo-7.2.5-1.81.1
      php72-snmp-7.2.5-1.81.1
      php72-snmp-debuginfo-7.2.5-1.81.1
      php72-soap-7.2.5-1.81.1
      php72-soap-debuginfo-7.2.5-1.81.1
      php72-sockets-7.2.5-1.81.1
      php72-sockets-debuginfo-7.2.5-1.81.1
      php72-sodium-7.2.5-1.81.1
      php72-sodium-debuginfo-7.2.5-1.81.1
      php72-sqlite-7.2.5-1.81.1
      php72-sqlite-debuginfo-7.2.5-1.81.1
      php72-sysvmsg-7.2.5-1.81.1
      php72-sysvmsg-debuginfo-7.2.5-1.81.1
      php72-sysvsem-7.2.5-1.81.1
      php72-sysvsem-debuginfo-7.2.5-1.81.1
      php72-sysvshm-7.2.5-1.81.1
      php72-sysvshm-debuginfo-7.2.5-1.81.1
      php72-tidy-7.2.5-1.81.1
      php72-tidy-debuginfo-7.2.5-1.81.1
      php72-tokenizer-7.2.5-1.81.1
      php72-tokenizer-debuginfo-7.2.5-1.81.1
      php72-wddx-7.2.5-1.81.1
      php72-wddx-debuginfo-7.2.5-1.81.1
      php72-xmlreader-7.2.5-1.81.1
      php72-xmlreader-debuginfo-7.2.5-1.81.1
      php72-xmlrpc-7.2.5-1.81.1
      php72-xmlrpc-debuginfo-7.2.5-1.81.1
      php72-xmlwriter-7.2.5-1.81.1
      php72-xmlwriter-debuginfo-7.2.5-1.81.1
      php72-xsl-7.2.5-1.81.1
      php72-xsl-debuginfo-7.2.5-1.81.1
      php72-zip-7.2.5-1.81.1
      php72-zip-debuginfo-7.2.5-1.81.1
      php72-zlib-7.2.5-1.81.1
      php72-zlib-debuginfo-7.2.5-1.81.1

   - SUSE Linux Enterprise Module for Web Scripting 12 (noarch):

      php72-pear-7.2.5-1.81.1
      php72-pear-Archive_Tar-7.2.5-1.81.1


References:

   https://www.suse.com/security/cve/CVE-2022-31625.html
   https://www.suse.com/security/cve/CVE-2022-31626.html
   https://bugzilla.suse.com/1200628
   https://bugzilla.suse.com/1200645

SUSE: 2022:2183-1 important: php72

June 24, 2022
An update that fixes two vulnerabilities is now available

Summary

This update for php72 fixes the following issues: - CVE-2022-31625: Fixed uninitialized pointers free in Postgres extension. (bsc#1200645) - CVE-2022-31626: Fixed buffer overflow via user-supplied password when using pdo_mysql extension with mysqlnd driver. (bsc#1200628) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-2183=1 - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2022-2183=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): php72-debuginfo-7.2.5-1.81.1 php72-debugsource-7.2.5-1.81.1 php72-devel-7.2.5-1.81.1 - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64): apache2-mod_php72-7.2.5-1.81.1 apache2-mod_php72-debuginfo-7.2.5-1.81.1 php72-7.2.5-1.81.1 php72-bcmath-7.2.5-1.81.1 php72-bcmath-debuginfo-7.2.5-1.81.1 php72-bz2-7.2.5-1.81.1 php72-bz2-debuginfo-7.2.5-1.81.1 php72-calendar-7.2.5-1.81.1 php72-calendar-debuginfo-7.2.5-1.81.1 php72-ctype-7.2.5-1.81.1 php72-ctype-debuginfo-7.2.5-1.81.1 php72-curl-7.2.5-1.81.1 php72-curl-debuginfo-7.2.5-1.81.1 php72-dba-7.2.5-1.81.1 php72-dba-debuginfo-7.2.5-1.81.1 php72-debuginfo-7.2.5-1.81.1 php72-debugsource-7.2.5-1.81.1 php72-dom-7.2.5-1.81.1 php72-dom-debuginfo-7.2.5-1.81.1 php72-enchant-7.2.5-1.81.1 php72-enchant-debuginfo-7.2.5-1.81.1 php72-exif-7.2.5-1.81.1 php72-exif-debuginfo-7.2.5-1.81.1 php72-fastcgi-7.2.5-1.81.1 php72-fastcgi-debuginfo-7.2.5-1.81.1 php72-fileinfo-7.2.5-1.81.1 php72-fileinfo-debuginfo-7.2.5-1.81.1 php72-fpm-7.2.5-1.81.1 php72-fpm-debuginfo-7.2.5-1.81.1 php72-ftp-7.2.5-1.81.1 php72-ftp-debuginfo-7.2.5-1.81.1 php72-gd-7.2.5-1.81.1 php72-gd-debuginfo-7.2.5-1.81.1 php72-gettext-7.2.5-1.81.1 php72-gettext-debuginfo-7.2.5-1.81.1 php72-gmp-7.2.5-1.81.1 php72-gmp-debuginfo-7.2.5-1.81.1 php72-iconv-7.2.5-1.81.1 php72-iconv-debuginfo-7.2.5-1.81.1 php72-imap-7.2.5-1.81.1 php72-imap-debuginfo-7.2.5-1.81.1 php72-intl-7.2.5-1.81.1 php72-intl-debuginfo-7.2.5-1.81.1 php72-json-7.2.5-1.81.1 php72-json-debuginfo-7.2.5-1.81.1 php72-ldap-7.2.5-1.81.1 php72-ldap-debuginfo-7.2.5-1.81.1 php72-mbstring-7.2.5-1.81.1 php72-mbstring-debuginfo-7.2.5-1.81.1 php72-mysql-7.2.5-1.81.1 php72-mysql-debuginfo-7.2.5-1.81.1 php72-odbc-7.2.5-1.81.1 php72-odbc-debuginfo-7.2.5-1.81.1 php72-opcache-7.2.5-1.81.1 php72-opcache-debuginfo-7.2.5-1.81.1 php72-openssl-7.2.5-1.81.1 php72-openssl-debuginfo-7.2.5-1.81.1 php72-pcntl-7.2.5-1.81.1 php72-pcntl-debuginfo-7.2.5-1.81.1 php72-pdo-7.2.5-1.81.1 php72-pdo-debuginfo-7.2.5-1.81.1 php72-pgsql-7.2.5-1.81.1 php72-pgsql-debuginfo-7.2.5-1.81.1 php72-phar-7.2.5-1.81.1 php72-phar-debuginfo-7.2.5-1.81.1 php72-posix-7.2.5-1.81.1 php72-posix-debuginfo-7.2.5-1.81.1 php72-pspell-7.2.5-1.81.1 php72-pspell-debuginfo-7.2.5-1.81.1 php72-readline-7.2.5-1.81.1 php72-readline-debuginfo-7.2.5-1.81.1 php72-shmop-7.2.5-1.81.1 php72-shmop-debuginfo-7.2.5-1.81.1 php72-snmp-7.2.5-1.81.1 php72-snmp-debuginfo-7.2.5-1.81.1 php72-soap-7.2.5-1.81.1 php72-soap-debuginfo-7.2.5-1.81.1 php72-sockets-7.2.5-1.81.1 php72-sockets-debuginfo-7.2.5-1.81.1 php72-sodium-7.2.5-1.81.1 php72-sodium-debuginfo-7.2.5-1.81.1 php72-sqlite-7.2.5-1.81.1 php72-sqlite-debuginfo-7.2.5-1.81.1 php72-sysvmsg-7.2.5-1.81.1 php72-sysvmsg-debuginfo-7.2.5-1.81.1 php72-sysvsem-7.2.5-1.81.1 php72-sysvsem-debuginfo-7.2.5-1.81.1 php72-sysvshm-7.2.5-1.81.1 php72-sysvshm-debuginfo-7.2.5-1.81.1 php72-tidy-7.2.5-1.81.1 php72-tidy-debuginfo-7.2.5-1.81.1 php72-tokenizer-7.2.5-1.81.1 php72-tokenizer-debuginfo-7.2.5-1.81.1 php72-wddx-7.2.5-1.81.1 php72-wddx-debuginfo-7.2.5-1.81.1 php72-xmlreader-7.2.5-1.81.1 php72-xmlreader-debuginfo-7.2.5-1.81.1 php72-xmlrpc-7.2.5-1.81.1 php72-xmlrpc-debuginfo-7.2.5-1.81.1 php72-xmlwriter-7.2.5-1.81.1 php72-xmlwriter-debuginfo-7.2.5-1.81.1 php72-xsl-7.2.5-1.81.1 php72-xsl-debuginfo-7.2.5-1.81.1 php72-zip-7.2.5-1.81.1 php72-zip-debuginfo-7.2.5-1.81.1 php72-zlib-7.2.5-1.81.1 php72-zlib-debuginfo-7.2.5-1.81.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): php72-pear-7.2.5-1.81.1 php72-pear-Archive_Tar-7.2.5-1.81.1

References

#1200628 #1200645

Cross- CVE-2022-31625 CVE-2022-31626

CVSS scores:

CVE-2022-31625 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-31626 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

SUSE Linux Enterprise High Performance Computing 12

SUSE Linux Enterprise Module for Web Scripting 12

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Server 12-SP3

SUSE Linux Enterprise Server 12-SP4

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server for SAP Applications 12

SUSE Linux Enterprise Server for SAP Applications 12-SP3

SUSE Linux Enterprise Server for SAP Applications 12-SP4

SUSE Linux Enterprise Server for SAP Applications 12-SP5

SUSE Linux Enterprise Software Development Kit 12-SP5

https://www.suse.com/security/cve/CVE-2022-31625.html

https://www.suse.com/security/cve/CVE-2022-31626.html

https://bugzilla.suse.com/1200628

https://bugzilla.suse.com/1200645

Severity
Announcement ID: SUSE-SU-2022:2183-1
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.