{"affected":[{"ecosystem_specific":{"binaries":[{"php7-wddx":"7.2.5-150000.4.98.2"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"php7","purl":"pkg:rpm/opensuse/php7&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"7.2.5-150000.4.98.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for php7 fixes the following issues:\n\n- CVE-2022-31628: Fixed an uncontrolled recursion in the phar uncompressor while decompressing 'quines' gzip files. (bsc#1203867)\n- CVE-2022-31629: Fixed a bug which could lead an attacker to set an insecure cookie that will treated as secure in the victim's browser. (bsc#1203870)\n","id":"SUSE-SU-2022:3830-1","modified":"2022-11-01T07:55:50Z","published":"2022-11-01T07:55:50Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20223830-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-31628"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-31629"}],"related":["CVE-2022-31628","CVE-2022-31629"],"summary":"Security update for php7","upstream":["CVE-2022-31628","CVE-2022-31629"]}