stable

php-8.3.8-1.fc40

FEDORA-2024-49aba7b305 created by remi a week ago for Fedora 40

PHP version 8.3.8 (06 Jun 2024)

CGI:

  • Fixed buffer limit on Windows, replacing read call usage by _read. (David Carlier)
  • Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577) (nielsdos)

CLI:

  • Fixed bug GH-14189 (PHP Interactive shell input state incorrectly handles quoted heredoc literals.). (nielsdos)

Core:

  • Fixed bug GH-13970 (Incorrect validation of #[Attribute] flags type for non-compile-time expressions). (ilutov)

DOM:

  • Fix crashes when entity declaration is removed while still having entity references. (nielsdos)
  • Fix references not handled correctly in C14N. (nielsdos)
  • Fix crash when calling childNodes next() when iterator is exhausted. (nielsdos)
  • Fix crash in ParentNode::append() when dealing with a fragment containing text nodes. (nielsdos)

Filter:

  • Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458) (nielsdos)

FPM:

  • Fix bug GH-14175 (Show decimal number instead of scientific notation in systemd status). (Benjamin Cremer)

Hash:

  • ext/hash: Swap the checking order of __has_builtin and __GNUC__ (Saki Takamachi)

Intl:

  • Fixed build regression on systems without C++17 compilers. (Calvin Buckley, Peter Kokot)

MySQLnd:

  • Fix bug GH-14255 (mysqli_fetch_assoc reports error from nested query). (Kamil Tekiela)

Opcache:

  • Fixed bug GH-14109 (Fix accidental persisting of internal class constant in shm). (ilutov)

OpenSSL:

  • The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable. (CVE-2024-2408)

Standard:

XML:

  • Fixed bug GH-14124 (Segmentation fault with XML extension under certain memory limit). (nielsdos)

XMLReader:

  • Fixed bug GH-14183 (XMLReader::open() can't be overridden). (nielsdos)

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2024-49aba7b305

This update has been submitted for testing by remi.

a week ago

This update's test gating status has been changed to 'ignored'.

a week ago
User Icon imabug provided feedback a week ago
karma

This update has been pushed to testing.

a week ago
User Icon rspliet provided feedback a week ago
karma

This update can be pushed to stable now if the maintainer wishes

a week ago

remi edited this update.

6 days ago

This update has been submitted for stable by remi.

6 days ago

This update has been pushed to stable.

5 days ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
2
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
a week ago
in testing
a week ago
in stable
5 days ago
modified
6 days ago
BZ#2291252 CVE-2024-5458 php: Filter bypass in filter_var (FILTER_VALIDATE_URL)
0
0
BZ#2291253 CVE-2024-5458 php: Filter bypass in filter_var (FILTER_VALIDATE_URL) [fedora-all]
0
0

Automated Test Results