Opened 6 months ago

Closed 6 months ago

Last modified 6 months ago

#20449 closed enhancement (fixed)

php-8.3.12

Reported by: Bruce Dubbs Owned by: Bruce Dubbs
Priority: elevated Milestone: 12.3
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (7)

comment:1 by Bruce Dubbs, 6 months ago

Owner: changed from blfs-book to Bruce Dubbs
Status: newassigned

comment:2 by Bruce Dubbs, 6 months ago

comment:3 by Bruce Dubbs, 6 months ago

  • Fixed bug GHSA-p99j-rfp4-xqvq (Bypass of CVE-2024-4577, Parameter Injection Vulnerability). (CVE-2024-8926)
  • Fixed bug GHSA-94p6-54jq-9mwp (cgi.force_redirect configuration is bypassable due to the environment variable collision). (CVE-2024-8927)

comment:4 by Bruce Dubbs, 6 months ago

Resolution: fixed
Status: assignedclosed

Fixed at commits

253ae3ffd8 Update to LibRaw-0.21.3.
a67b4d72a3 Update to bluefish-2.2.16.
e25267094d Update to git-2.46.2.
dabc860d61 Update to fribidi-1.0.16.
ac4cf9a4eb Update to glslang-15.0.0.
3a910c72d2 Update to php-8.3.12.
84e1f8f4da Update to qt6 and QtWebEngine-6.7.3

comment:5 by Douglas R. Reno, 6 months ago

We've also got two more security fixes here beyond the CGI fixes:

FPM:

  • Fixed bug GHSA-865w-9rf3-2wh5 (Logs from childrens may be altered). (CVE-2024-9026)

SAPI:

  • Fixed bug GHSA-9pqp-7h25-4f32 (Erroneous parsing of multipart form data). (CVE-2024-8925)

comment:6 by Douglas R. Reno, 6 months ago

Priority: normalelevated

CVE-2024-9026 and CVE-2024-8925 are rated Low

CVE-2024-8927 is rated Moderate

CVE-2024-8926 is Windows specific

comment:7 by Douglas R. Reno, 6 months ago

SA-12.2-014 issued

Note: See TracTickets for help on using tickets.