-------------------------------------------------------------------------
Debian LTS Advisory DLA-3920-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                       Guilhem Moulin
October 14, 2024                              https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : php7.4
Version        : 7.4.33-1+deb11u6
CVE ID         : CVE-2022-4900 CVE-2024-5458 CVE-2024-8925 CVE-2024-8927
                 CVE-2024-9026
Debian Bug     : 1072885

Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language, which could result in execution of
arbitrary code, erroneous parsing of invalid URLs or multipart form
data, configuration setting bypass, or log pollution.

CVE-2022-4900

    It was discovered that setting the environment variable
    PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer
    overflow.

CVE-2024-5458

    Due to a code logic error, filtering functions such as filter_var
    when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs
    the function results in invalid user information (username +
    password part of URLs) being treated as valid user information.
    This may lead to the downstream code accepting invalid URLs as valid
    and parsing them incorrectly.

    This causes the same problems as CVE-2020-7071, but with IPv6 host
    parts.

CVE-2024-8925

    Mihail Kirov discovered an erroneous parsing of multipart form data
    contained in an HTTP POST request, which could lead to legitimate
    data not being processed thereby violating data integrity.

CVE-2024-8927

    It was discovered that the `cgi.force_redirect` configuration
    setting is bypassable due to environment variable collision.

CVE-2024-9026

    In PHP-FPM, when configured to catch workers output through
    catch_workers_output = yes configuration, it may be possible to
    pollute the final log with up to 4 characters from the
    FPM_STDIO_CMD_FLUSH macro, or remove up to 4 characters from the
    logs.

For Debian 11 bullseye, these problems have been fixed in version
7.4.33-1+deb11u6.

We recommend that you upgrade your php7.4 packages.

For the detailed security status of php7.4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.4

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3920-1: php7.4 Security Advisory Updates

October 15, 2024
Multiple security issues were found in PHP, a widely-used open source general purpose scripting language, which could result in execution of arbitrary code, erroneous parsing of in...

Summary

CVE-2022-4900

It was discovered that setting the environment variable
PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer
overflow.

CVE-2024-5458

Due to a code logic error, filtering functions such as filter_var
when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs
the function results in invalid user information (username +
password part of URLs) being treated as valid user information.
This may lead to the downstream code accepting invalid URLs as valid
and parsing them incorrectly.

This causes the same problems as CVE-2020-7071, but with IPv6 host
parts.

CVE-2024-8925

Mihail Kirov discovered an erroneous parsing of multipart form data
contained in an HTTP POST request, which could lead to legitimate
data not being processed thereby violating data integrity.

CVE-2024-8927

It was discovered that the `cgi.force_redirect` configuration
setting is bypassable due to environment variable collision.

CVE-2024-9026

In PHP-FPM, when configured to catch workers output through
catch_workers_output = yes configuration, it may be possible to
pollute the final log with up to 4 characters from the
FPM_STDIO_CMD_FLUSH macro, or remove up to 4 characters from the
logs.

For Debian 11 bullseye, these problems have been fixed in version
7.4.33-1+deb11u6.

We recommend that you upgrade your php7.4 packages.

For the detailed security status of php7.4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.4

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : php7.4
Version : 7.4.33-1+deb11u6
CVE ID : CVE-2022-4900 CVE-2024-5458 CVE-2024-8925 CVE-2024-8927
Debian Bug : 1072885

Related News