File _patchinfo of Package patchinfo.27345

<patchinfo incident="27345">
  <issue tracker="cve" id="2022-31631"/>
  <issue tracker="cve" id="2014-9709"/>
  <issue tracker="cve" id="2015-3411"/>
  <issue tracker="bnc" id="935227">VUL-0: CVE-2015-3411: php5,php53: missing null byte checks for paths in various PHP extensions</issue>
  <issue tracker="bnc" id="1206958">VUL-0: CVE-2022-31631: php53,php7,php72,php74,php8,php5: Due to an integer overflow PDO:quote() may return unquoted string</issue>
  <issue tracker="bnc" id="923946">VUL-1: CVE-2014-9709: php5: embedded gd copy: buffer read overflow in gd_gif_in.c</issue>
  <packager>pgajdos</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for php74</summary>
  <description>This update for php74 fixes the following issues:

- CVE-2022-31631: Fixed an issue where PDO::quote would return an
  unquoted string (bsc#1206958).
</description>
</patchinfo>
openSUSE Build Service is sponsored by