<html>
    <head>
      <base href="https://bugzilla.rosalinux.ru/">
    </head>
    <body><table border="1" cellspacing="0" cellpadding="8">
        <tr>
          <th>Platform</th>
          <td>2021.1
          </td>
        </tr>

        <tr>
          <th>Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_CONFIRMED "
   title="CONFIRMED - [CVE 21] php 7.4.30 CVEs found"
   href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13297">13297</a>
          </td>
        </tr>

        <tr>
          <th>Summary</th>
          <td>[CVE 21] php 7.4.30  CVEs found
          </td>
        </tr>

        <tr>
          <th>Classification</th>
          <td>ROSA-based products
          </td>
        </tr>

        <tr>
          <th>Product</th>
          <td>ROSA Fresh
          </td>
        </tr>

        <tr>
          <th>Version</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>Hardware</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>URL</th>
          <td>CVE-2022-31628, CVE-2022-31629, CVE-2022-31630, CVE-2022-37454,
          </td>
        </tr>

        <tr>
          <th>OS</th>
          <td>Linux
          </td>
        </tr>

        <tr>
          <th>Status</th>
          <td>CONFIRMED
          </td>
        </tr>

        <tr>
          <th>Severity</th>
          <td>normal
          </td>
        </tr>

        <tr>
          <th>Priority</th>
          <td>Normal
          </td>
        </tr>

        <tr>
          <th>Component</th>
          <td>System (kernel, glibc, systemd, bash, PAM...)
          </td>
        </tr>

        <tr>
          <th>Assignee</th>
          <td>bugs&#64;lists.rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>Reporter</th>
          <td>y.tumanov&#64;rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>QA Contact</th>
          <td>bugs&#64;lists.rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>CC</th>
          <td>s.matveev&#64;rosalinux.ru, y.tumanov&#64;rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>Target Milestone</th>
          <td>---
          </td>
        </tr>

        <tr>
          <th>Flags</th>
          <td>secteam_verified?
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Please patch CVEs for package php version 7.4.30

INFO (CVEs are): php 7.4.30
 cves found
CVE-2022-31628
Desc: In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor
code would recursively uncompress &quot;quines&quot; gzip files, resulting in an infinite
loop.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">https://nvd.nist.gov/vuln/detail/CVE-2022-31628</a>
Severity: MEDIUM
CVE-2022-31629
Desc: In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability
enables network and same-site attackers to set a standard insecure cookie in
the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by
PHP applications.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">https://nvd.nist.gov/vuln/detail/CVE-2022-31629</a>
Severity: MEDIUM
CVE-2022-31630
Desc: In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using
imageloadfont() function in gd extension, it is possible to supply a specially
crafted font file, such as if the loaded font is used with imagechar()
function, the read outside allocated buffer will be used. This can lead to
crashes or disclosure of confidential information.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">https://nvd.nist.gov/vuln/detail/CVE-2022-31630</a>
Severity: HIGH
CVE-2022-37454
Desc: The Keccak XKCP SHA-3 reference implementation before fdc6fef has an
integer overflow and resultant buffer overflow that allows attackers to execute
arbitrary code or eliminate expected cryptographic properties. This occurs in
the sponge function interface.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">https://nvd.nist.gov/vuln/detail/CVE-2022-37454</a>
Severity: CRITICAL</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are the QA Contact for the bug.</li>
          <li>You are the assignee for the bug.</li>
      </ul>
    </body>
</html>