summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGLSAMaker <glsamaker@gentoo.org>2024-08-12 07:39:21 +0000
committerHans de Graaff <graaff@gentoo.org>2024-08-12 09:43:34 +0200
commit30ce731e4321742de9b62d58a1f60dbe0cb57e0d (patch)
treeb60ae8c836867ef59e6cb30a2740eead529bba34
parent[ GLSA 202408-31 ] protobuf, protobuf-python: Denial of Service (diff)
downloadglsa-30ce731e4321742de9b62d58a1f60dbe0cb57e0d.tar.gz
glsa-30ce731e4321742de9b62d58a1f60dbe0cb57e0d.tar.bz2
glsa-30ce731e4321742de9b62d58a1f60dbe0cb57e0d.zip
[ GLSA 202408-32 ] PHP: Multiple Vulnerabilities
Bug: https://bugs.gentoo.org/889882 Bug: https://bugs.gentoo.org/895416 Bug: https://bugs.gentoo.org/908259 Bug: https://bugs.gentoo.org/912331 Bug: https://bugs.gentoo.org/929929 Bug: https://bugs.gentoo.org/933752 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org>
-rw-r--r--glsa-202408-32.xml71
1 files changed, 71 insertions, 0 deletions
diff --git a/glsa-202408-32.xml b/glsa-202408-32.xml
new file mode 100644
index 00000000..80eb1ad1
--- /dev/null
+++ b/glsa-202408-32.xml
@@ -0,0 +1,71 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202408-32">
+ <title>PHP: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service.</synopsis>
+ <product type="ebuild">php</product>
+ <announced>2024-08-12</announced>
+ <revised count="1">2024-08-12</revised>
+ <bug>889882</bug>
+ <bug>895416</bug>
+ <bug>908259</bug>
+ <bug>912331</bug>
+ <bug>929929</bug>
+ <bug>933752</bug>
+ <access>local and remote</access>
+ <affected>
+ <package name="dev-lang/php" auto="yes" arch="*">
+ <unaffected range="ge" slot="8.1">8.1.29</unaffected>
+ <unaffected range="ge" slot="8.2">8.2.20</unaffected>
+ <unaffected range="ge" slot="8.3">8.3.8</unaffected>
+ <vulnerable range="lt">8.1</vulnerable>
+ <vulnerable range="ge" slot="8.1">8.1.29</vulnerable>
+ <vulnerable range="ge" slot="8.2">8.2.20</vulnerable>
+ <vulnerable range="ge" slot="8.3">8.3.8</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="high">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All PHP users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-lang/php-8.1.29:8.1"
+ # emerge --ask --oneshot --verbose ">=dev-lang/php-8.2.20:8.2"
+ # emerge --ask --oneshot --verbose ">=dev-lang/php-8.3.8:8.3"
+ </code>
+
+ <p>Support for older version has been discontinued:</p>
+
+ <code>
+ # emerge --ask --verbose --depclean "&lt;dev-lang/php-8.1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-0662">CVE-2023-0662</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-2757">CVE-2024-2757</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-4577">CVE-2024-4577</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-5585">CVE-2024-5585</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-08-12T07:39:21.009398Z">graaff</metadata>
+ <metadata tag="submitter" timestamp="2024-08-12T07:39:21.012299Z">graaff</metadata>
+</glsa>