Operating System:

[Debian]

Published:

14 November 2022

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.5860
                          php7.4 security update
                             14 November 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           php7.4
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-37454 CVE-2022-31630 CVE-2022-31629
                   CVE-2022-31628  

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2022/msg00247.html

Comment: CVSS (Max):  9.8 CVE-2022-37454 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: [NVD], Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5277-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 13, 2022                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : php7.4
CVE ID         : CVE-2022-31630 CVE-2022-37454 CVE-2022-31629 CVE-2022-31628

Multiple security issues were discovered in PHP, a widely-used open
source general purpose scripting language which could result an denial
of service, information disclosure, insecure cooking handling or
potentially the execution of arbitrary code.

For the stable distribution (bullseye), these problems have been fixed in
version 7.4.33-1+deb11u1.

We recommend that you upgrade your php7.4 packages.

For the detailed security status of php7.4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.4

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

- -----BEGIN PGP SIGNATURE-----
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=MMQt
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=ZzoM
-----END PGP SIGNATURE-----