php-8.0.30-2.el9
エラータID: AXSA:2025-10238:04
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP
Server.
Security Fix(es):
php: host/secure cookie bypass due to partial CVE-2022-31629 fix
(CVE-2024-2756)
php: password_verify can erroneously return true, opening ATO risk
(CVE-2024-3096)
php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458)
php: Erroneous parsing of multipart form data (CVE-2024-8925)
php: cgi.force_redirect configuration is bypassable due to the environment
variable collision (CVE-2024-8927)
php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026)
php: Leak partial content of the heap through heap buffer over-read in
mysqlnd (CVE-2024-8929)
php: Single byte overread with convert.quoted-printable-decode filter
(CVE-2024-11233)
php: Configuring a proxy in a stream context might allow for CRLF injection
in URIs (CVE-2024-11234)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE(s):
CVE-2024-2756
Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.
CVE-2024-3096
In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.
CVE-2024-5458
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
CVE-2024-8925
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
CVE-2024-8927
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
CVE-2024-8929
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.
CVE-2024-9026
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
CVE-2024-11233
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
CVE-2024-11234
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
Update packages.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.
In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
N/A
SRPMS
- php-8.0.30-2.el9.src.rpm
MD5: 1a12978232fc1abe1ea3016533a8d2c5
SHA-256: e456d5c398bc5c21c09a8790e7caca5919dcad97864de34da8ad69b1f19d3eff
Size: 10.53 MB
Asianux Server 9 for x86_64
- php-8.0.30-2.el9.x86_64.rpm
MD5: cf0630abef362e0b2df6c1fc5583f1c5
SHA-256: 0147f19cf2c5d68da6b435a382596d09eff79d24f787de3395da4be5b71c6b2e
Size: 7.55 kB - php-bcmath-8.0.30-2.el9.x86_64.rpm
MD5: 8983ec255bfbe630181cd6debb8797fd
SHA-256: dfe780984b1d0d6d8b8cddf4f91f43542d68cd8c39e57d523d1fdbe01d8d6273
Size: 32.67 kB - php-cli-8.0.30-2.el9.x86_64.rpm
MD5: e8d9a13e03b38b4db3e04260bc3f72b6
SHA-256: 5cb26ba7524be5114e66ff57c428dd86a6565452fe43f88a0dc8b0245e846534
Size: 3.09 MB - php-common-8.0.30-2.el9.x86_64.rpm
MD5: 736865ddcf8f4569da9b2b005f4fe2c1
SHA-256: 875622a8a1f4bb9c3225889e1a700fff05609f03c2667ef901ff0f15ccccf20e
Size: 676.79 kB - php-dba-8.0.30-2.el9.x86_64.rpm
MD5: 969f82f3669dae53ef8a6e48da9fc5e9
SHA-256: 8995398ad9953fce2b33310f7ca81ddbb3d61b45f4c13125a30a49cde3844b12
Size: 31.52 kB - php-dbg-8.0.30-2.el9.x86_64.rpm
MD5: 16ad754d095c6f23a5f6d4a7378115bf
SHA-256: b6e26ffba19d1425aac570ef8ca78a0ea1d6ee4f94e21b137e612e6d9d92eebc
Size: 1.63 MB - php-devel-8.0.30-2.el9.x86_64.rpm
MD5: ec79cefdb00e11d15b92a768e0f65681
SHA-256: 66568406b9d48f552e26c6a444b4398b245d6d76297099f2d660378846392208
Size: 724.37 kB - php-embedded-8.0.30-2.el9.x86_64.rpm
MD5: be5d83259779171a49d169b66be759aa
SHA-256: 7b99e958a33fcd54bec457d701ec6245501020951144577b14aa1e8d412d867e
Size: 1.51 MB - php-enchant-8.0.30-2.el9.x86_64.rpm
MD5: e65fd914410d527f7769d2a8116574bc
SHA-256: 42a346b0083fdcc24eac26221bf27f207b39a05e4ccdd7380e58ed5eccc19e28
Size: 17.22 kB - php-ffi-8.0.30-2.el9.x86_64.rpm
MD5: ab1331c1988f47276cea9ab400ac488c
SHA-256: 9dad4b16e6cb4802cada4bb2d0cc2c8962264875d4e34512193ee0d9e9f49bcc
Size: 72.14 kB - php-fpm-8.0.30-2.el9.x86_64.rpm
MD5: 6a38116d4436e118db19518b576ca2b2
SHA-256: e755a6303f09fc9e3a74f364e047d04994cda99d678ecb7f7b287966d2a803af
Size: 1.59 MB - php-gd-8.0.30-2.el9.x86_64.rpm
MD5: c55e8b8e1606eed40ebdc4523b296124
SHA-256: 8bffbb2f45e1e7835927f6c6b9603e5b0206a8894c72dec3657c440b79128944
Size: 38.60 kB - php-gmp-8.0.30-2.el9.x86_64.rpm
MD5: e89c663f261dd506610abf1868a5107b
SHA-256: 028b17ed6e6d8ece8fcf84190a137ce8989ad37792883ca668dba8ec9a8d4f3e
Size: 29.05 kB - php-intl-8.0.30-2.el9.x86_64.rpm
MD5: 9c2ad00fb5d33873f8eb38b576a32a3a
SHA-256: 6e13ed9aed6ba391cbdbcb085b04b328cb0c4a02ff8fe6a58e8722d723b2d5ba
Size: 146.82 kB - php-ldap-8.0.30-2.el9.x86_64.rpm
MD5: 239d790be37917abc33f7e23a2a323db
SHA-256: 05b2e8b553bb3a3f66150731324a8f8874e3ff872bba348b60df054c34dda877
Size: 38.39 kB - php-mbstring-8.0.30-2.el9.x86_64.rpm
MD5: 0e64fdc86898c9ae0ac2baa3821b2708
SHA-256: b4f8710e7a6e90dce448cbee6c76c7071f6ce753d4e617e6a0eb08acf5ecdb9f
Size: 465.29 kB - php-mysqlnd-8.0.30-2.el9.x86_64.rpm
MD5: b96f9eb96e7249fc3c936d462a781948
SHA-256: 08c75f4a436f654379a7300cb33dab2b855974eb12793e0c23923f482a8689b4
Size: 149.18 kB - php-odbc-8.0.30-2.el9.x86_64.rpm
MD5: 259370d33af4cc89f3638b888d20e056
SHA-256: 46850fcf2deda3b8f2c69d7b3c3783b8d00bd95c8033142c86a65ec24100f1a0
Size: 42.55 kB - php-opcache-8.0.30-2.el9.x86_64.rpm
MD5: 0e6466ad020f90c8c9eb9b5c61c08613
SHA-256: 215b8f35bab384c917930e233a44fae1ddac1b278b57b20ce2df53d6ed2d0980
Size: 509.11 kB - php-pdo-8.0.30-2.el9.x86_64.rpm
MD5: 093cce55ccf28000154f473583bdff13
SHA-256: 88ee1db72458e34b028ab5d01bf687a8a044334cb591b81f73a4cb4aa15f222e
Size: 80.28 kB - php-pgsql-8.0.30-2.el9.x86_64.rpm
MD5: cd889a3fb60dc53acd3f4673d1fc30f3
SHA-256: 380257c19fee9c0f27046dd01b8e15f9f6202799567b00cee96690dba898312b
Size: 70.28 kB - php-process-8.0.30-2.el9.x86_64.rpm
MD5: 89a5a47484fa07b96c97d52ba637c9ad
SHA-256: e1943cd9c19420c9a0682605430bdef35c915a403d61eaeb6453ca8e87df99b7
Size: 39.39 kB - php-snmp-8.0.30-2.el9.x86_64.rpm
MD5: 24ff3b22ca2f0d4c00494b4b2370668c
SHA-256: 364bd009b6f3094e52e083509eb69deb1c4885a68cba1e7747f34c01574eaff9
Size: 28.68 kB - php-soap-8.0.30-2.el9.x86_64.rpm
MD5: ada2e6de0ac414d29638bbdea2b673d6
SHA-256: f0528394d9d73190772e06d3aaa6a047e78d321c6730777dd061887eeaf1fc00
Size: 132.35 kB - php-xml-8.0.30-2.el9.x86_64.rpm
MD5: 8099a44addf57a3e4958ff3e21b97f1f
SHA-256: 8662178dcd3f2061c77ee3ffabdd5df4370e60ec10c40ffe55cbae7c329931e0
Size: 131.34 kB