File _patchinfo of Package patchinfo.36663
<patchinfo incident="36663"> <issue tracker="cve" id="2024-11233"/> <issue tracker="cve" id="2024-8929"/> <issue tracker="cve" id="2024-11234"/> <issue tracker="bnc" id="1233702">VUL-0: CVE-2024-11233: php74, php8: single-byte buffer overread due to missing bounds check when processing input with convert.quoted-printable-decode filters</issue> <issue tracker="bnc" id="1233651">VUL-0: CVE-2024-8929: php: In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests ...</issue> <issue tracker="bnc" id="1233703">VUL-0: CVE-2024-11234: php74, php8: configuring streams with a proxy and the 'request_fulluri' context option might allow for CRLF injection in URIs</issue> <packager>pgajdos</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for php8</summary> <description>This update for php8 fixes the following issues: - CVE-2024-11233: buffer overread when processing input with the convert.quoted-printable-decode filter. (bsc#1233702) - CVE-2024-11234: possible CRLF injection in URIs when a proxy is configured in a stream context. (bsc#1233703) - CVE-2024-8929: data exposure on MySQL clients due to heap buffer overread in mysqlnd. (bsc#1233651) </description> </patchinfo>