DSA-5179-1 php7.4 -- security update

Related Vulnerabilities: CVE-2022-31625   CVE-2022-31626  

Charles Fol discovered two security issues in PHP, a widely-used open source general purpose scripting language which could result an denial of service or potentially the execution of arbitrary code: CVE-2022-31625 Incorrect memory handling in the pg_query_params() function. CVE-2022-31626 A buffer overflow in the mysqld extension. For the stable distribution (bullseye), these problems have been fixed in version 7.4.30-1+deb11u1. We recommend that you upgrade your php7.4 packages. For the detailed security status of php7.4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php7.4

Debian Security Advisory

DSA-5179-1 php7.4 -- security update

Date Reported:
08 Jul 2022
Affected Packages:
php7.4
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2022-31625, CVE-2022-31626.
More information:

Charles Fol discovered two security issues in PHP, a widely-used open source general purpose scripting language which could result an denial of service or potentially the execution of arbitrary code:

For the stable distribution (bullseye), these problems have been fixed in version 7.4.30-1+deb11u1.

We recommend that you upgrade your php7.4 packages.

For the detailed security status of php7.4 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php7.4