128 lines
5.1 KiB
JSON
Raw Normal View History

2024-04-16 21:02:47 +00:00
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20246446",
"Version": "oval:org.altlinux.errata:def:20246446",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-6446: package `php8.3` update to version 8.3.6-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f2"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-6446",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-6446",
"Source": "ALTPU"
},
{
"RefID": "CVE-2024-1874",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1874",
"Source": "CVE"
},
{
"RefID": "CVE-2024-2756",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-2756",
"Source": "CVE"
},
{
"RefID": "CVE-2024-2757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-2757",
"Source": "CVE"
},
{
"RefID": "CVE-2024-3096",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3096",
"Source": "CVE"
}
],
2024-04-29 09:02:12 +00:00
"Description": "This update upgrades php8.3 to version 8.3.6-alt1. \nSecurity Fix(es):\n\n * CVE-2024-1874: In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. \n\n\n\n * CVE-2024-2756: Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications. \n\n\n * CVE-2024-2757: In PHP 8.3.* before 8.3.5, function mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function. \n\n\n\n * CVE-2024-3096: In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true.\n\n",
2024-04-16 21:02:47 +00:00
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-04-16"
},
"Updated": {
"Date": "2024-04-16"
},
"BDUs": null,
2024-04-29 09:02:12 +00:00
"CVEs": [
{
"ID": "CVE-2024-1874",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1874",
"Impact": "None",
"Public": "20240429"
},
{
"ID": "CVE-2024-2756",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-2756",
"Impact": "None",
"Public": "20240429"
},
{
"ID": "CVE-2024-2757",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-2757",
"Impact": "None",
"Public": "20240429"
},
{
"ID": "CVE-2024-3096",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3096",
"Impact": "None",
"Public": "20240429"
}
],
2024-04-16 21:02:47 +00:00
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20246446001",
"Comment": "php8.3 is earlier than 0:8.3.6-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246446002",
"Comment": "php8.3-devel is earlier than 0:8.3.6-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246446003",
"Comment": "php8.3-libs is earlier than 0:8.3.6-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246446004",
"Comment": "php8.3-mysqlnd is earlier than 0:8.3.6-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246446005",
"Comment": "rpm-build-php8.3-version is earlier than 0:8.3.6-alt1"
}
]
}
]
}
}
]
}