Описание
Security update for php7
This update for php7 fixes the following issues:
- CVE-2024-8925: Fixed erroneous parsing of multipart form data in HTTP POST requests leads to legitimate data not being processed (bsc#1231360)
- CVE-2024-8927: Fixed cgi.force_redirect configuration is bypassable due to an environment variable collision (bsc#1231358)
- CVE-2024-9026: Fixed pollution of worker output logs in PHP-FPM (bsc#1231382)
Список пакетов
SUSE Linux Enterprise Module for Legacy 15 SP5
SUSE Linux Enterprise Module for Legacy 15 SP6
SUSE Linux Enterprise Module for Package Hub 15 SP5
SUSE Linux Enterprise Module for Package Hub 15 SP6
openSUSE Leap 15.5
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:3733-1
- E-Mail link for SUSE-SU-2024:3733-1
- SUSE Security Ratings
- SUSE Bug 1231358
- SUSE Bug 1231360
- SUSE Bug 1231382
- SUSE CVE CVE-2024-8925 page
- SUSE CVE CVE-2024-8927 page
- SUSE CVE CVE-2024-9026 page
Описание
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
Затронутые продукты
Ссылки
- CVE-2024-8925
- SUSE Bug 1231360
Описание
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
Затронутые продукты
Ссылки
- CVE-2024-8927
- SUSE Bug 1231358
Описание
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
Затронутые продукты
Ссылки
- CVE-2024-9026
- SUSE Bug 1231382