Bug 1203870 (CVE-2022-31629)

Summary: VUL-0: CVE-2022-31629: php72,php7,php5,php8,php53,php74: attackers may be able to set an insecure cookie that will treated as secure in the victim's browser
Product: [Novell Products] SUSE Security Incidents Reporter: Carlos López <carlos.lopez>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: security-team, stoyan.manolov
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/343793/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Carlos López 2022-09-29 07:40:22 UTC
CVE-2022-31629

In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables
network and same-site attackers to set a standard insecure cookie in the
victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP
applications.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31629
https://www.cve.org/CVERecord?id=CVE-2022-31629
http://www.cvedetails.com/cve/CVE-2022-31629/
https://bugs.php.net/bug.php?id=81727
Comment 1 Carlos López 2022-09-29 07:40:39 UTC
No details yet, upstream bug is private
Comment 2 Petr Gajdos 2022-10-03 08:27:38 UTC
Bug is public now.
Comment 6 Petr Gajdos 2022-10-03 14:43:06 UTC
Submitted for: 15sp4/php8, 15sp4,15sp2,15/php7, 12/php74,php72 and 11sp3/php53.

I believe all fixed.
Comment 8 Swamp Workflow Management 2022-10-19 16:22:40 UTC
SUSE-SU-2022:3661-1: An update that solves three vulnerabilities, contains two features and has one errata is now available.

Category: security (important)
Bug References: 1192050,1200772,1203867,1203870
CVE References: CVE-2021-21703,CVE-2022-31628,CVE-2022-31629
JIRA References: SLE-23639,SLE-24723
Sources used:
openSUSE Leap 15.4 (src):    apache2-mod_php8-8.0.24-150400.4.14.1, php8-8.0.24-150400.4.14.1, php8-embed-8.0.24-150400.4.14.1, php8-fastcgi-8.0.24-150400.4.14.1, php8-fpm-8.0.24-150400.4.14.1, php8-test-8.0.24-150400.4.14.1
SUSE Linux Enterprise Module for Web Scripting 15-SP4 (src):    apache2-mod_php8-8.0.24-150400.4.14.1, php8-8.0.24-150400.4.14.1, php8-embed-8.0.24-150400.4.14.1, php8-fastcgi-8.0.24-150400.4.14.1, php8-fpm-8.0.24-150400.4.14.1, php8-test-8.0.24-150400.4.14.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2022-11-01 14:30:41 UTC
SUSE-SU-2022:3830-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1203867,1203870
CVE References: CVE-2022-31628,CVE-2022-31629
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    php7-7.2.5-150000.4.98.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Swamp Workflow Management 2022-11-11 20:51:34 UTC
SUSE-SU-2022:3957-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1203867,1203870
CVE References: CVE-2022-31628,CVE-2022-31629
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    php72-7.2.5-1.84.1
SUSE Linux Enterprise Module for Web Scripting 12 (src):    php72-7.2.5-1.84.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Swamp Workflow Management 2022-11-15 20:33:06 UTC
SUSE-SU-2022:3997-1: An update that fixes 8 vulnerabilities, contains one feature is now available.

Category: security (important)
Bug References: 1203867,1203870,1204577,1204979
CVE References: CVE-2021-21707,CVE-2021-21708,CVE-2022-31625,CVE-2022-31626,CVE-2022-31628,CVE-2022-31629,CVE-2022-31630,CVE-2022-37454
JIRA References: SLE-23639
Sources used:
openSUSE Leap 15.4 (src):    apache2-mod_php7-7.4.33-150400.4.13.1, php7-7.4.33-150400.4.13.1, php7-embed-7.4.33-150400.4.13.1, php7-fastcgi-7.4.33-150400.4.13.1, php7-fpm-7.4.33-150400.4.13.1, php7-test-7.4.33-150400.4.13.2
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src):    php7-embed-7.4.33-150400.4.13.1
SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src):    apache2-mod_php7-7.4.33-150400.4.13.1, php7-7.4.33-150400.4.13.1, php7-fastcgi-7.4.33-150400.4.13.1, php7-fpm-7.4.33-150400.4.13.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Swamp Workflow Management 2022-11-18 14:26:01 UTC
SUSE-SU-2022:4068-1: An update that fixes 18 vulnerabilities, contains one feature is now available.

Category: security (important)
Bug References: 1203867,1203870,1204577,1204979
CVE References: CVE-2017-8923,CVE-2020-7068,CVE-2020-7069,CVE-2020-7070,CVE-2020-7071,CVE-2021-21702,CVE-2021-21703,CVE-2021-21704,CVE-2021-21705,CVE-2021-21706,CVE-2021-21707,CVE-2021-21708,CVE-2022-31625,CVE-2022-31626,CVE-2022-31628,CVE-2022-31629,CVE-2022-31630,CVE-2022-37454
JIRA References: SLE-23639
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    php74-7.4.33-1.47.2
SUSE Linux Enterprise Module for Web Scripting 12 (src):    php74-7.4.33-1.47.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Swamp Workflow Management 2022-11-18 14:28:04 UTC
SUSE-SU-2022:4069-1: An update that fixes 18 vulnerabilities, contains one feature is now available.

Category: security (important)
Bug References: 1203867,1203870,1204577,1204979
CVE References: CVE-2017-8923,CVE-2020-7068,CVE-2020-7069,CVE-2020-7070,CVE-2020-7071,CVE-2021-21702,CVE-2021-21703,CVE-2021-21704,CVE-2021-21705,CVE-2021-21706,CVE-2021-21707,CVE-2021-21708,CVE-2022-31625,CVE-2022-31626,CVE-2022-31628,CVE-2022-31629,CVE-2022-31630,CVE-2022-37454
JIRA References: SLE-23639
Sources used:
openSUSE Leap 15.4 (src):    php7-7.4.33-150200.3.46.2
openSUSE Leap 15.3 (src):    php7-7.4.33-150200.3.46.2, php7-test-7.4.33-150200.3.46.2
SUSE Manager Server 4.1 (src):    php7-7.4.33-150200.3.46.2
SUSE Manager Retail Branch Server 4.1 (src):    php7-7.4.33-150200.3.46.2
SUSE Manager Proxy 4.1 (src):    php7-7.4.33-150200.3.46.2
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    php7-7.4.33-150200.3.46.2
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    php7-7.4.33-150200.3.46.2
SUSE Linux Enterprise Server 15-SP2-BCL (src):    php7-7.4.33-150200.3.46.2
SUSE Linux Enterprise Module for Web Scripting 15-SP3 (src):    php7-7.4.33-150200.3.46.2
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src):    php7-7.4.33-150200.3.46.2
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    php7-7.4.33-150200.3.46.2
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    php7-7.4.33-150200.3.46.2
SUSE Enterprise Storage 7 (src):    php7-7.4.33-150200.3.46.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.