Source: php8.1 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security
Hi, The following vulnerabilities were published for php8.1. CVE-2022-31628[0]: | In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar | uncompressor code would recursively uncompress "quines" gzip files, | resulting in an infinite loop. PHP Bug: https://bugs.php.net/bug.php?id=81726 https://github.com/php/php-src/commit/404e8bdb68350931176a5bdc86fc417b34fb583d https://github.com/php/php-src/commit/432bf196d59bcb661fcf9cb7029cea9b43f490af CVE-2022-31629[1]: | In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability | enables network and same-site attackers to set a standard insecure | cookie in the victim's browser which is treated as a `__Host-` or | `__Secure-` cookie by PHP applications. PHP Bug: https://bugs.php.net/bug.php?id=81727 https://github.com/php/php-src/commit/0611be4e82887cee0de6c4cbae320d34eec946ca If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-31628 https://www.cve.org/CVERecord?id=CVE-2022-31628 [1] https://security-tracker.debian.org/tracker/CVE-2022-31629 https://www.cve.org/CVERecord?id=CVE-2022-31629 Please adjust the affected versions in the BTS as needed.