File _patchinfo of Package patchinfo.36545
<patchinfo incident="36545">
<issue tracker="cve" id="2024-11234"/>
<issue tracker="cve" id="2024-11233"/>
<issue tracker="cve" id="2024-8929"/>
<issue tracker="bnc" id="1233651">VUL-0: CVE-2024-8929: php: In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests ...</issue>
<issue tracker="bnc" id="1233702">VUL-0: CVE-2024-11233: php74, php8: single-byte buffer overread due to missing bounds check when processing input with convert.quoted-printable-decode filters</issue>
<issue tracker="bnc" id="1233703">VUL-0: CVE-2024-11234: php74, php8: configuring streams with a proxy and the 'request_fulluri' context option might allow for CRLF injection in URIs</issue>
<packager>pgajdos</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for php7</summary>
<description>This update for php7 fixes the following issues:
- CVE-2024-11233: Single byte overread with convert.quoted-printable-decode filter (bsc#1233702).
- CVE-2024-11234: Configuring a proxy in a stream context might allow for CRLF injection in URIs (bsc#1233703).
- CVE-2024-8929: Leak partial content of the heap through heap buffer over-read (bsc#1233651).
</description>
</patchinfo>