aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMuhammad Moinur Rahman <bofh@FreeBSD.org>2024-04-16 19:31:50 +0000
committerMuhammad Moinur Rahman <bofh@FreeBSD.org>2024-04-16 19:31:50 +0000
commit39a934fedb7da69d62b309f76255972bf74acd9c (patch)
tree4b06abe1325b35a081f4f88502a104d4c7c34b7e
parentc25ea6511fd7590cfe750af7fe901fdfa212edb5 (diff)
downloadports-39a934fedb7da69d62b309f76255972bf74acd9c.tar.gz
ports-39a934fedb7da69d62b309f76255972bf74acd9c.zip
security/vuxml: Add entries for php8*
Approved by: portmgr (blanket)
-rw-r--r--security/vuxml/vuln/2024.xml45
1 files changed, 45 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index b9a1df0e5a5f..c8b089205457 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,48 @@
+ <vuln vid="6d82c5e9-fc24-11ee-a689-04421a1baf97">
+ <topic>php -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>php81</name>
+ <range><lt>8.1.28</lt></range>
+ </package>
+ <package>
+ <name>php82</name>
+ <range><lt>8.2.18</lt></range>
+ </package>
+ <package>
+ <name>php83</name>
+ <range><lt>8.3.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>This update includes 3 security fixes:</p>
+ <blockquote cite="https://seclists.org/oss-sec/2024/q2/113/">
+ <ul>
+ <li>High CVE-2024-1874: Command injection via array-ish $command parameter of proc_open even if bypass_shell option enabled on Windows</li>
+ <li>High CVE-2024-1874: Command injection via array-ish $command parameter of proc_open even if bypass_shell option enabled on Windows</li>
+ <li>Medium CVE-2024-2756: __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix</li>
+ <li>High CVE-2024-2757: mb_encode_mimeheader runs endlessly for some inputs</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2024-1874</cvename>
+ <url>https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7</url>
+ <cvename>CVE-2024-2756</cvename>
+ <url>https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4</url>
+ <cvename>CVE-2024-3096</cvename>
+ <url>https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr</url>
+ <cvename>CVE-2024-2757</cvename>
+ <url>https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq</url>
+ </references>
+ <dates>
+ <discovery>2024-04-11</discovery>
+ <entry>2024-04-16</entry>
+ </dates>
+ </vuln>
+
<vuln vid="cdb5e0e3-fafc-11ee-9c21-901b0e9408dc">
<topic>go -- http2: close connections when receiving too many headers</topic>
<affects>