Source: php8.2
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for php8.2. I think
the plan is to switch to 8.3 for trixie, so 8.2 will probably
be removed at some point, but still filing a bug to keep track
of these issues in the interim:

CVE-2024-11233[0]:
| In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.*
| before 8.3.14, due to an error in convert.quoted-printable-decode
| filter certain data can lead to buffer overread by one byte, which
| can in certain circumstances lead to crashes or disclose content of
| other memory areas.


CVE-2024-11234[1]:
| In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.*
| before 8.3.14, when using streams with configured proxy and
| "request_fulluri" option, the URI is not properly sanitized which
| can lead to HTTP request smuggling and allow the attacker to use the
| proxy to perform arbitrary HTTP requests originating from the
| server, thus potentially gaining access to resources not normally
| available to the external user.


CVE-2024-11236[2]:
| In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.*
| before 8.3.14, uncontrolled long string inputs to
| ldap_escape() function on 32-bit systems can cause an integer
| overflow, resulting in an out-of-bounds write.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-11233
    https://www.cve.org/CVERecord?id=CVE-2024-11233
[1] https://security-tracker.debian.org/tracker/CVE-2024-11234
    https://www.cve.org/CVERecord?id=CVE-2024-11234
[2] https://security-tracker.debian.org/tracker/CVE-2024-11236
    https://www.cve.org/CVERecord?id=CVE-2024-11236

Please adjust the affected versions in the BTS as needed.

Reply via email to