{"schema_version":"1.7.2","id":"OESA-2023-1273","modified":"2023-05-12T11:05:15Z","published":"2023-05-12T11:05:15Z","upstream":["CVE-2022-31629"],"summary":"php security update","details":"PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts.The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.\r\n\r\nSecurity Fix(es):\r\n\r\nIn PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim\u0026apos;s browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.(CVE-2022-31629)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS","name":"php","purl":"pkg:rpm/openEuler/php\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.28-1.oe2203"}]}],"ecosystem_specific":{"aarch64":["php-soap-8.0.28-1.oe2203.aarch64.rpm","php-mysqlnd-8.0.28-1.oe2203.aarch64.rpm","php-intl-8.0.28-1.oe2203.aarch64.rpm","php-cli-8.0.28-1.oe2203.aarch64.rpm","php-tidy-8.0.28-1.oe2203.aarch64.rpm","php-debuginfo-8.0.28-1.oe2203.aarch64.rpm","php-debugsource-8.0.28-1.oe2203.aarch64.rpm","php-enchant-8.0.28-1.oe2203.aarch64.rpm","php-pgsql-8.0.28-1.oe2203.aarch64.rpm","php-bcmath-8.0.28-1.oe2203.aarch64.rpm","php-odbc-8.0.28-1.oe2203.aarch64.rpm","php-devel-8.0.28-1.oe2203.aarch64.rpm","php-dbg-8.0.28-1.oe2203.aarch64.rpm","php-ffi-8.0.28-1.oe2203.aarch64.rpm","php-process-8.0.28-1.oe2203.aarch64.rpm","php-snmp-8.0.28-1.oe2203.aarch64.rpm","php-8.0.28-1.oe2203.aarch64.rpm","php-help-8.0.28-1.oe2203.aarch64.rpm","php-fpm-8.0.28-1.oe2203.aarch64.rpm","php-ldap-8.0.28-1.oe2203.aarch64.rpm","php-opcache-8.0.28-1.oe2203.aarch64.rpm","php-dba-8.0.28-1.oe2203.aarch64.rpm","php-pdo-8.0.28-1.oe2203.aarch64.rpm","php-common-8.0.28-1.oe2203.aarch64.rpm","php-embedded-8.0.28-1.oe2203.aarch64.rpm","php-gd-8.0.28-1.oe2203.aarch64.rpm","php-gmp-8.0.28-1.oe2203.aarch64.rpm","php-mbstring-8.0.28-1.oe2203.aarch64.rpm","php-xml-8.0.28-1.oe2203.aarch64.rpm"],"src":["php-8.0.28-1.oe2203.src.rpm"],"x86_64":["php-common-8.0.28-1.oe2203.x86_64.rpm","php-devel-8.0.28-1.oe2203.x86_64.rpm","php-opcache-8.0.28-1.oe2203.x86_64.rpm","php-pdo-8.0.28-1.oe2203.x86_64.rpm","php-bcmath-8.0.28-1.oe2203.x86_64.rpm","php-gmp-8.0.28-1.oe2203.x86_64.rpm","php-mbstring-8.0.28-1.oe2203.x86_64.rpm","php-cli-8.0.28-1.oe2203.x86_64.rpm","php-tidy-8.0.28-1.oe2203.x86_64.rpm","php-mysqlnd-8.0.28-1.oe2203.x86_64.rpm","php-ldap-8.0.28-1.oe2203.x86_64.rpm","php-8.0.28-1.oe2203.x86_64.rpm","php-soap-8.0.28-1.oe2203.x86_64.rpm","php-snmp-8.0.28-1.oe2203.x86_64.rpm","php-gd-8.0.28-1.oe2203.x86_64.rpm","php-fpm-8.0.28-1.oe2203.x86_64.rpm","php-xml-8.0.28-1.oe2203.x86_64.rpm","php-ffi-8.0.28-1.oe2203.x86_64.rpm","php-debugsource-8.0.28-1.oe2203.x86_64.rpm","php-process-8.0.28-1.oe2203.x86_64.rpm","php-dbg-8.0.28-1.oe2203.x86_64.rpm","php-pgsql-8.0.28-1.oe2203.x86_64.rpm","php-dba-8.0.28-1.oe2203.x86_64.rpm","php-help-8.0.28-1.oe2203.x86_64.rpm","php-odbc-8.0.28-1.oe2203.x86_64.rpm","php-embedded-8.0.28-1.oe2203.x86_64.rpm","php-debuginfo-8.0.28-1.oe2203.x86_64.rpm","php-intl-8.0.28-1.oe2203.x86_64.rpm","php-enchant-8.0.28-1.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1273"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31629"}],"database_specific":{"severity":"Medium"}}