Source: php8.2
Version: 8.2.18-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for php8.2.

CVE-2024-4577[0]:
| Bypass of CVE-2012-1823, Argument Injection in PHP-CGI


CVE-2024-5458[1]:
| In PHP versionsĀ 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.*
| before 8.3.8, due to a code logic error, filtering functions such as
| filter_var when validating URLsĀ (FILTER_VALIDATE_URL) for certain
| types of URLs the function will result in invalid user information
| (username + password part of URLs) being treated as valid user
| information. This may lead to the downstream code accepting invalid
| URLs as valid and parsing them incorrectly.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-4577
    https://www.cve.org/CVERecord?id=CVE-2024-4577
[1] https://security-tracker.debian.org/tracker/CVE-2024-5458
    https://www.cve.org/CVERecord?id=CVE-2024-5458

Regards,
Salvatore

Reply via email to