File _patchinfo of Package patchinfo.36663

<patchinfo incident="36663">
  <issue tracker="cve" id="2024-11233"/>
  <issue tracker="cve" id="2024-8929"/>
  <issue tracker="cve" id="2024-11234"/>
  <issue tracker="bnc" id="1233702">VUL-0: CVE-2024-11233: php74, php8: single-byte buffer overread due to missing bounds check when processing input with convert.quoted-printable-decode filters</issue>
  <issue tracker="bnc" id="1233651">VUL-0: CVE-2024-8929: php: In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests  ...</issue>
  <issue tracker="bnc" id="1233703">VUL-0: CVE-2024-11234: php74, php8: configuring streams with a proxy and the 'request_fulluri' context option might allow for CRLF injection in URIs</issue>
  <packager>pgajdos</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for php8</summary>
  <description>This update for php8 fixes the following issues:

- CVE-2024-11233: buffer overread when processing input with the convert.quoted-printable-decode filter. (bsc#1233702) 
- CVE-2024-11234: possible CRLF injection in URIs when a proxy is configured in a stream context. (bsc#1233703)
- CVE-2024-8929: data exposure on MySQL clients due to heap buffer overread in mysqlnd. (bsc#1233651)
</description>
</patchinfo>
openSUSE Build Service is sponsored by