Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU70788
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-31631
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to integer overflow when processing untrusted input within the PDO::quote() in PDO_SQLite. A remote attacker can pass a specially crafted input to the application that after being processed by the affected PDO::quote() method will return a quoted string, which can result in a SQL injection. MitigationUpdate the affected package php8 to the latest version.
Vulnerable software versionsSUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
SUSE Linux Enterprise Module for Web Scripting: 15-SP4
SUSE Linux Enterprise Server: 15-SP4
openSUSE Leap: 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP4
php8-zlib-debuginfo: before 8.0.27-150400.4.23.1
php8-zlib: before 8.0.27-150400.4.23.1
php8-zip-debuginfo: before 8.0.27-150400.4.23.1
php8-zip: before 8.0.27-150400.4.23.1
php8-xsl-debuginfo: before 8.0.27-150400.4.23.1
php8-xsl: before 8.0.27-150400.4.23.1
php8-xmlwriter-debuginfo: before 8.0.27-150400.4.23.1
php8-xmlwriter: before 8.0.27-150400.4.23.1
php8-xmlreader-debuginfo: before 8.0.27-150400.4.23.1
php8-xmlreader: before 8.0.27-150400.4.23.1
php8-tokenizer-debuginfo: before 8.0.27-150400.4.23.1
php8-tokenizer: before 8.0.27-150400.4.23.1
php8-tidy-debuginfo: before 8.0.27-150400.4.23.1
php8-tidy: before 8.0.27-150400.4.23.1
php8-test: before 8.0.27-150400.4.23.1
php8-sysvshm-debuginfo: before 8.0.27-150400.4.23.1
php8-sysvshm: before 8.0.27-150400.4.23.1
php8-sysvsem-debuginfo: before 8.0.27-150400.4.23.1
php8-sysvsem: before 8.0.27-150400.4.23.1
php8-sysvmsg-debuginfo: before 8.0.27-150400.4.23.1
php8-sysvmsg: before 8.0.27-150400.4.23.1
php8-sqlite-debuginfo: before 8.0.27-150400.4.23.1
php8-sqlite: before 8.0.27-150400.4.23.1
php8-sodium-debuginfo: before 8.0.27-150400.4.23.1
php8-sodium: before 8.0.27-150400.4.23.1
php8-sockets-debuginfo: before 8.0.27-150400.4.23.1
php8-sockets: before 8.0.27-150400.4.23.1
php8-soap-debuginfo: before 8.0.27-150400.4.23.1
php8-soap: before 8.0.27-150400.4.23.1
php8-snmp-debuginfo: before 8.0.27-150400.4.23.1
php8-snmp: before 8.0.27-150400.4.23.1
php8-shmop-debuginfo: before 8.0.27-150400.4.23.1
php8-shmop: before 8.0.27-150400.4.23.1
php8-readline-debuginfo: before 8.0.27-150400.4.23.1
php8-readline: before 8.0.27-150400.4.23.1
php8-posix-debuginfo: before 8.0.27-150400.4.23.1
php8-posix: before 8.0.27-150400.4.23.1
php8-phar-debuginfo: before 8.0.27-150400.4.23.1
php8-phar: before 8.0.27-150400.4.23.1
php8-pgsql-debuginfo: before 8.0.27-150400.4.23.1
php8-pgsql: before 8.0.27-150400.4.23.1
php8-pdo-debuginfo: before 8.0.27-150400.4.23.1
php8-pdo: before 8.0.27-150400.4.23.1
php8-pcntl-debuginfo: before 8.0.27-150400.4.23.1
php8-pcntl: before 8.0.27-150400.4.23.1
php8-openssl-debuginfo: before 8.0.27-150400.4.23.1
php8-openssl: before 8.0.27-150400.4.23.1
php8-opcache-debuginfo: before 8.0.27-150400.4.23.1
php8-opcache: before 8.0.27-150400.4.23.1
php8-odbc-debuginfo: before 8.0.27-150400.4.23.1
php8-odbc: before 8.0.27-150400.4.23.1
php8-mysql-debuginfo: before 8.0.27-150400.4.23.1
php8-mysql: before 8.0.27-150400.4.23.1
php8-mbstring-debuginfo: before 8.0.27-150400.4.23.1
php8-mbstring: before 8.0.27-150400.4.23.1
php8-ldap-debuginfo: before 8.0.27-150400.4.23.1
php8-ldap: before 8.0.27-150400.4.23.1
php8-intl-debuginfo: before 8.0.27-150400.4.23.1
php8-intl: before 8.0.27-150400.4.23.1
php8-iconv-debuginfo: before 8.0.27-150400.4.23.1
php8-iconv: before 8.0.27-150400.4.23.1
php8-gmp-debuginfo: before 8.0.27-150400.4.23.1
php8-gmp: before 8.0.27-150400.4.23.1
php8-gettext-debuginfo: before 8.0.27-150400.4.23.1
php8-gettext: before 8.0.27-150400.4.23.1
php8-gd-debuginfo: before 8.0.27-150400.4.23.1
php8-gd: before 8.0.27-150400.4.23.1
php8-ftp-debuginfo: before 8.0.27-150400.4.23.1
php8-ftp: before 8.0.27-150400.4.23.1
php8-fpm-debugsource: before 8.0.27-150400.4.23.1
php8-fpm-debuginfo: before 8.0.27-150400.4.23.1
php8-fpm: before 8.0.27-150400.4.23.1
php8-fileinfo-debuginfo: before 8.0.27-150400.4.23.1
php8-fileinfo: before 8.0.27-150400.4.23.1
php8-fastcgi-debugsource: before 8.0.27-150400.4.23.1
php8-fastcgi-debuginfo: before 8.0.27-150400.4.23.1
php8-fastcgi: before 8.0.27-150400.4.23.1
php8-exif-debuginfo: before 8.0.27-150400.4.23.1
php8-exif: before 8.0.27-150400.4.23.1
php8-enchant-debuginfo: before 8.0.27-150400.4.23.1
php8-enchant: before 8.0.27-150400.4.23.1
php8-embed-debugsource: before 8.0.27-150400.4.23.1
php8-embed-debuginfo: before 8.0.27-150400.4.23.1
php8-embed: before 8.0.27-150400.4.23.1
php8-dom-debuginfo: before 8.0.27-150400.4.23.1
php8-dom: before 8.0.27-150400.4.23.1
php8-devel: before 8.0.27-150400.4.23.1
php8-debugsource: before 8.0.27-150400.4.23.1
php8-debuginfo: before 8.0.27-150400.4.23.1
php8-dba-debuginfo: before 8.0.27-150400.4.23.1
php8-dba: before 8.0.27-150400.4.23.1
php8-curl-debuginfo: before 8.0.27-150400.4.23.1
php8-curl: before 8.0.27-150400.4.23.1
php8-ctype-debuginfo: before 8.0.27-150400.4.23.1
php8-ctype: before 8.0.27-150400.4.23.1
php8-cli-debuginfo: before 8.0.27-150400.4.23.1
php8-cli: before 8.0.27-150400.4.23.1
php8-calendar-debuginfo: before 8.0.27-150400.4.23.1
php8-calendar: before 8.0.27-150400.4.23.1
php8-bz2-debuginfo: before 8.0.27-150400.4.23.1
php8-bz2: before 8.0.27-150400.4.23.1
php8-bcmath-debuginfo: before 8.0.27-150400.4.23.1
php8-bcmath: before 8.0.27-150400.4.23.1
php8: before 8.0.27-150400.4.23.1
apache2-mod_php8-debugsource: before 8.0.27-150400.4.23.1
apache2-mod_php8-debuginfo: before 8.0.27-150400.4.23.1
apache2-mod_php8: before 8.0.27-150400.4.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20230074-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.