Fedora 37 : php (2022-f204e1d0ed)

critical Nessus Plugin ID 211146

Synopsis

The remote Fedora host is missing one or more security updates.

Description

The remote Fedora 37 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2022-f204e1d0ed advisory.

**PHP version 8.1.12** (27 Oct 2022)

**Core:**

* Fixes segfault with Fiber on FreeBSD i386 architecture. (David Carlier)

**Fileinfo:**

* Fixed bug [GH-8805](https://github.com/php/php-src/issues/8805) (finfo returns wrong mime type for woff/woff2 files). (Anatol)

**GD:**

* Fixed bug php#81739: OOB read due to insufficient input validation in imageloadfont().
(**CVE-2022-31630**) (cmb)

**Hash:**

* Fixed bug php#81738: buffer overflow in hash_update() on long parameter. (**CVE-2022-37454**) (nicky at mouha dot be)

**MBString:**

- Fixed bug [GH-9683](https://github.com/php/php-src/issues/9683) (Problem when ISO-2022-JP-MS is specified in mb_ encode_mimeheader). (Alex Dowad)

**Opcache:**

* Added indirect call reduction for jit on x86 architectures. (wxue1)

**Session:**

* Fixed bug [GH-9583](https://github.com/php/php-src/issues/9583) (session_create_id() fails with user defined save handler that doesn't have a validateId() method). (Girgias)

**Streams:**

* Fixed bug [GH-9590](https://github.com/php/php-src/issues/9590) (stream_select does not abort upon exception or empty valid fd set). (Arnaud)

----

**PHP version 8.1.11** (29 Sep 2022)

**Core:**

* Fixed bug php#81726: phar wrapper: DOS when using quine gzip file. (**CVE-2022-31628**). (cmb)
* Fixed bug php#81727: Don't mangle HTTP variable names that clash with ones that have a specific semantic meaning. (**CVE-2022-31629**). (Derick)
* Fixed bug [GH-9323](https://github.com/php/php-src/issues/9323) (Crash in ZEND_RETURN/GC/zend_call_function) (Tim Starling)
* Fixed bug [GH-9361](https://github.com/php/php-src/issues/9361) (Segmentation fault on script exit php#9379). (cmb, Christian Schneider)
* Fixed bug [GH-9447](https://github.com/php/php-src/issues/9447) (Invalid class FQN emitted by AST dump for new and class constants in constant expressions). (ilutov)

**DOM:**

* Fixed bug php#79451 (DOMDocument->replaceChild on doctype causes double free). (Nathan Freeman)

**FPM:**

* Fixed bug [GH-8885](https://github.com/php/php-src/issues/8885) (FPM access.log with stderr begins to write logs to error_log after daemon reload). (Dmitry Menshikov)
* Fixed bug php#77780 (Headers already sent... when previous connection was aborted). (Jakub Zelenka)

**GMP**

* Fixed bug [GH-9308](https://github.com/php/php-src/issues/9308) (GMP throws the wrong error when a GMP object is passed to gmp_init()). (Girgias)

**Intl**

* Fixed bug [GH-9421](https://github.com/php/php-src/issues/9421) (Incorrect argument number for ValueError in NumberFormatter). (Girgias)

**PCRE:**

* Fixed pcre.jit on Apple Silicon. (Niklas Keller)

**PDO_PGSQL:**

* Fixed bug [GH-9411](https://github.com/php/php-src/issues/9411) (PgSQL large object resource is incorrectly closed). (Yurunsoft)

**Reflection:**

* Fixed bug [GH-8932](https://github.com/php/php-src/issues/8932) (ReflectionFunction provides no way to get the called class of a Closure). (cmb, Nicolas Grekas)

**Streams:**

* Fixed bug [GH-9316](https://github.com/php/php-src/issues/9316) ($http_response_header is wrong for long status line). (cmb, timwolla)


Tenable has extracted the preceding description block directly from the Fedora security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected php package.

See Also

https://bodhi.fedoraproject.org/updates/FEDORA-2022-f204e1d0ed

Plugin Details

Severity: Critical

ID: 211146

File Name: fedora_2022-f204e1d0ed.nasl

Version: 1.1

Type: local

Agent: unix

Published: 11/14/2024

Updated: 11/14/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, continuous_assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-37454

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:php, cpe:/o:fedoraproject:fedora:37

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/26/2022

Vulnerability Publication Date: 9/27/2022

Reference Information

CVE: CVE-2022-31628, CVE-2022-31629, CVE-2022-31630, CVE-2022-37454

FEDORA: 2022-f204e1d0ed

IAVA: 2022-A-0397-S, 2022-A-0455-S, 2022-A-0515-S