git: 537b5822a5c0 - main - security/vuxml: Document PHP vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 14 Mar 2025 07:55:59 UTC
The branch main has been updated by bofh: URL: https://cgit.FreeBSD.org/ports/commit/?id=537b5822a5c034186e31f3f633d6c48e6668211c commit 537b5822a5c034186e31f3f633d6c48e6668211c Author: Christos Chatzaras <chris@cretaforce.gr> AuthorDate: 2025-03-14 07:45:28 +0000 Commit: Muhammad Moinur Rahman <bofh@FreeBSD.org> CommitDate: 2025-03-14 07:55:44 +0000 security/vuxml: Document PHP vulnerabilities PR: 285386 --- security/vuxml/vuln/2025.xml | 72 +++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 71 insertions(+), 1 deletion(-) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 275e4224a4d2..7f38e65b7cb8 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,73 @@ + <vuln vid="2ac2ddc2-0051-11f0-8673-f02f7432cf97"> + <topic>php -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>php81</name> + <range> + <lt>8.1.32</lt> + </range> + </package> + <package> + <name>php82</name> + <range> + <lt>8.2.28</lt> + </range> + </package> + <package> + <name>php83</name> + <range> + <lt>8.3.19</lt> + </range> + </package> + <package> + <name>php84</name> + <range> + <lt>8.4.5</lt> + </range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>php.net reports:</p> + <blockquote cite="https://www.php.net/ChangeLog-8.php"> + <ul> + <li> + CVE-2024-11235: Core: Fixed GHSA-rwp7-7vc6-8477 (Reference counting in php_request_shutdown causes Use-After-Free). + </li> + <li> + CVE-2025-1219: LibXML: Fixed GHSA-p3x9-6h7p-cgfc (libxml streams use wrong `content-type` header when requesting a redirected resource). + </li> + <li> + CVE-2025-1736: Streams: Fixed GHSA-hgf5-96fm-v528 (Stream HTTP wrapper header check might omit basic auth header). + </li> + <li> + CVE-2025-1861: Streams: Fixed GHSA-52jp-hrpf-2jff (Stream HTTP wrapper truncate redirect location to 1024 bytes). + </li> + <li> + CVE-2025-1734: Streams: Fixed GHSA-pcmh-g36c-qc44 (Streams HTTP wrapper does not fail for headers without colon). + </li> + <li> + CVE-2025-1217: Streams: Fixed GHSA-v8xr-gpvj-cx9g (Header parser of `http` stream wrapper does not handle folded headers). + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-11235</cvename> + <cvename>CVE-2025-1219</cvename> + <cvename>CVE-2025-1736</cvename> + <cvename>CVE-2025-1861</cvename> + <cvename>CVE-2025-1734</cvename> + <cvename>CVE-2025-1217</cvename> + <url>https://www.php.net/ChangeLog-8.php</url> + </references> + <dates> + <discovery>2025-03-13</discovery> + <entry>2025-03-13</entry> + </dates> + </vuln> + <vuln vid="0b43fac4-005d-11f0-a540-6cc21735f730"> <topic>shibboleth-sp -- Parameter manipulation allows the forging of signed SAML messages</topic> <affects> @@ -53,7 +123,7 @@ vulnerability by editing the protocols.xml configuration file and removing this line: <code><Binding id="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign" - path="/SAML2/POST-SimpleSign" /></code> + path="/SAML2/POST-SimpleSign" /></code> </p> </blockquote> </body>