Die Entwickler von PHP haben heute die Updates 8.3.8, 8.2.20 und 8.1.29, der unterstützten Zweige, veröffentlicht. Die Updates sind Security Releases die auch Fehler korrigieren und umgehend installiert werden sollten. Die Updates schließen die in den folgenden CVEs genannten Sicherheitslücken:
- CVE-2024-4577 (OS Command Injection),
- CVE-2024-5458 (Input validation error),
- CVE-2024-5585 (OS Command Injection)
PHP 8.3.8 Release Notes
- CGI:
- Fixed buffer limit on Windows, replacing read call usage by _read.
- Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577)
- CLI:
- Fixed bug GH-14189 (PHP Interactive shell input state incorrectly handles quoted heredoc literals.).
- Core:
- Fixed bug GH-13970 (Incorrect validation of #[Attribute] flags type for non-compile-time expressions).
- DOM:
- Fix crashes when entity declaration is removed while still having entity references.
- Fix references not handled correctly in C14N.
- Fix crash when calling childNodes next() when iterator is exhausted.
- Fix crash in ParentNode::append() when dealing with a fragment containing text nodes.
- Filter:
- Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458)
- FPM:
- Fix bug GH-14175 (Show decimal number instead of scientific notation in systemd status).
- Hash:
- ext/hash: Swap the checking order of `__has_builtin` and `__GNUC__` (Saki Takamachi)
- Intl:
- Fixed build regression on systems without C++17 compilers.
- MySQLnd:
- Fix bug GH-14255 (mysqli_fetch_assoc reports error from nested query).
- Opcache:
- Fixed bug GH-14109 (Fix accidental persisting of internal class constant in shm).
- OpenSSL:
- The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable.
- Standard:
- Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585)
- XML:
- Fixed bug GH-14124 (Segmentation fault with XML extension under certain memory limit).
- XMLReader:
- Fixed bug GH-14183 (XMLReader::open() can’t be overridden).
PHP 8.2.20 Release Notes
- CGI:
- Fixed buffer limit on Windows, replacing read call usage by _read.
- Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577)
- CLI:
- Fixed bug GH-14189 (PHP Interactive shell input state incorrectly handles quoted heredoc literals.).
- Core:
- DOM:
- Fix crashes when entity declaration is removed while still having entity references.
- Fix references not handled correctly in C14N.
- Fix crash when calling childNodes next() when iterator is exhausted.
- Fix crash in ParentNode::append() when dealing with a fragment containing text nodes.
- FFI:
- Fixed bug GH-14215 (Cannot use FFI::load on CRLF header file with apache2handler).
- Filter:
- Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458)
- FPM:
- Fix bug GH-14175 (Show decimal number instead of scientific notation in systemd status).
- Hash:
- ext/hash: Swap the checking order of `__has_builtin` and `__GNUC__` (Saki Takamachi)
- Intl:
- Fixed build regression on systems without C++17 compilers.
- Ini:
- Fixed bug GH-14100 (Corrected spelling mistake in php.ini files).
- MySQLnd:
- Fix bug GH-14255 (mysqli_fetch_assoc reports error from nested query).
- Opcache:
- Fixed bug GH-14109 (Fix accidental persisting of internal class constant in shm).
- OpenSSL:
- The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable.
- Standard:
- Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585)
- XML:
- Fixed bug GH-14124 (Segmentation fault with XML extension under certain memory limit).
- XMLReader:
- Fixed bug GH-14183 (XMLReader::open() can’t be overridden).
PHP 8.1.29 Release Notes
- CGI:
- Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577)
- Filter:
- Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458)
- OpenSSL:
- The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable.
- Standard:
- Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585)
Quelle: https://www.php.net/
Interessiert in verschiedenste IT Themen, schreibe ich in diesem Blog über Software, Hardware, Smart Home, Games und vieles mehr. Ich berichte z.B. über die Installation und Konfiguration von Software als auch von Problemen mit dieser. News sind ebenso spannend, sodass ich auch über Updates, Releases und Neuigkeiten aus der IT berichte. Letztendlich nutze ich Taste-of-IT als eigene Dokumentation und Anlaufstelle bei wiederkehrenden Themen. Ich hoffe ich kann dich ebenso informieren und bei Problemen eine schnelle Lösung anbieten. Wer meinen Aufwand unterstützen möchte, kann gerne eine Tasse oder Pod Kaffe per PayPal spenden – vielen Dank.