Package | php7.3 |
---|---|
Version | 7.3.31-1~deb10u9 (buster) |
Related CVEs | CVE-2024-8929 CVE-2024-8932 CVE-2024-11233 CVE-2024-11234 CVE-2024-11236 |
- CVE-2024-8929
-
Sébastien Rolland discovered a partial content leak of the heap through heap buffer over-read in mysqlnd.
By connecting to a fake MySQL server or tampering with network packets and initiating a SQL Query, it is possible to abuse
php_mysqlnd_rset_field_read()
when parsing MySQL fields packets in order to include the rest of the heap content starting from the address of the cursor of the currently read buffer. - CVE-2024-8932
-
Yiheng Cao discovered that uncontrolled long string inputs to
ldap_escape()
on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. - CVE-2024-11233
-
A memory-related vulnerability was discovered in the filter handling system, particularly when processing input with
convert.quoted-printable-decode
filters, which could lead to a segmentation fault.This vulnerability is triggered through specific sequences of input data, causing PHP to crash. When exploited, it allows an attacker to extract a single byte of data from the heap or result in denial of service.
- CVE-2024-11234
-
Lorenzo Leonardini discovered that Configuring a proxy in a stream context might allow for CRLF injection in URIs, which could lead to authorization bypass by Server Side Request Forgery attack (SSRF).
- CVE-2024-11236
-
An integer overflow vulnerability was found in the firebird and dblib quoters, which can result in out-of-bounds writes.
- GHSA-4w77-75f9-2c8w
-
A heap-use-after-free vulnerability was discovered in the
sapi_read_post_data()
function, which could allow an attacker to exploit memory safety issues duringPOST
request processing.
For Debian 10 buster, these problems have been fixed in version 7.3.31-1~deb10u9.
We recommend that you upgrade your php7.3 packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.