MGASA-2024-0132

Source
https://advisories.mageia.org/MGASA-2024-0132.html
Import Source
https://advisories.mageia.org/MGASA-2024-0132.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0132
Related
Published
2024-04-13T16:56:38Z
Modified
2024-04-13T16:36:32Z
Summary
Updated php packages fix security vulnerabilities
Details

Core: - Corrupted memory in destructor with weak references - GC does not scale well with a lot of objects created in destructor DOM: - Add some missing ZPP checks. - Fix potential memory leak in XPath evaluation results. FPM: - Fix incorrect check in fpmshmfree(). Gettext: - Fixed sigabrt raised with dcgettext/dcngettext calls with gettext 0.22.5 with category set to LCALL. MySQLnd: - Fixed handshake response [mysqlnd] - Fix incorrect charset length in checkmbeucjpms(). Opcache: - JITed QMASSIGN may be optimized out when op1 is null - Segmentation fault for enabled observers when calling trait method of internal trait when opcache is loaded PDO: - Fix various PDORow bugs. Random: - Pre-PHP 8.2 compatibility for mtsrand with unknown modes - Global Mt19937 is not properly reset in-between requests when MTRANDPHP is used Session: - Segfault with sessiondecode and compilation error Sockets: - socketgetsockname returns random characters in the end of the socket name SPL: - Unable to resize SplfixedArray after being unserialized in PHP 8.2.15 - Unexpected null pointer in zendstring.h Standard: - Added validation of \n in $additionalheaders of mail() - Command injection via array-ish $command parameter of procopen). (CVE-2024-1874) Fixed bug GHSA-wpj3-hf5j-x4v4 (Host-/Secure- cookie bypass due to partial CVE-2022-31629 fix). (CVE-2024-2756) - password_verify can erroneously return true, opening ATO risk. (CVE-2024-3096)

References
Credits

Affected packages

Mageia:9 / php

Package

Name
php
Purl
pkg:rpm/mageia/php?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.2.18-1.mga9

Ecosystem specific

{
    "section": "core"
}