During the month of October 2024 and on behalf of Freexian, I worked on the
following:

php7.4
------

Uploaded 7.4.33-1+deb11u6 and issued DLA-3920-1.
https://lists.debian.org/msgid-search/?m=zw20swdcj3zl6...@debian.org

  * CVE-2022-4900: Setting the environment variable
    PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer
    overflow.
  * CVE-2024-5458: A code logic error may lead to the downstream code
    accepting invalid URLs as valid and parsing them incorrectly.
  * CVE-2024-8925: Erroneous parsing of multipart form data contained in
    an HTTP POST request
  * CVE-2024-9026: Log pollution in PHP-FPM when configured to catch
    workers output.
  * CVE-2024-8927: `cgi.force_redirect` configuration setting is
    bypassable.

php7.3
------

Uploaded 7.3.31-1~deb10u8 (buster) and issued ELA-1206-1.
https://www.freexian.com/lts/extended/updates/ela-1206-1-php7.3/

  * CVE-2024-8925: Erroneous parsing of multipart form data contained in
    an HTTP POST request
  * CVE-2024-8927: `cgi.force_redirect` configuration setting is
    bypassable.

php7.0
------

Uploaded 7.0.33-0+deb9u19 (stretch) and issued ELA-1207-1.
https://www.freexian.com/lts/extended/updates/ela-1207-1-php7.0/

  * CVE-2024-8925: Erroneous parsing of multipart form data contained in
    an HTTP POST request
  * CVE-2024-8927: `cgi.force_redirect` configuration setting is
    bypassable.

php5
----

Uploaded 5.6.40+dfsg-0+deb8u21 (jessie) and issued ELA-1208-1.
https://www.freexian.com/lts/extended/updates/ela-1208-1-php5/

  * CVE-2024-8925: Erroneous parsing of multipart form data contained in
    an HTTP POST request
  * CVE-2024-8927: `cgi.force_redirect` configuration setting is
    bypassable.

perl
----

Uploaded 5.32.1-4+deb11u4 and issued DLA-3926-1.
https://lists.debian.org/msgid-search/?m=zxzh5eneqthpx...@debian.org

  * CVE-2020-16156: Signature verification bypass in CPAN.pm.
  * CVE-2023-31484: CPAN::HTTP::Client did not verify X.509 certificates
    in the HTTP::Tiny call.

Also, reviewed Bastien work for buster and jessie ELTS at his request.

Thanks to the sponsors for financing the above, and to Freexian for
coordinating!
-- 
Guilhem.

Attachment: signature.asc
Description: PGP signature

Reply via email to