Hi,

You are receiving an AlmaLinux Security update email because you subscribed to 
receive errata notifications from AlmaLinux.

AlmaLinux: 9
Type: Security
Severity: Moderate
Release date: 2024-12-16

Summary:

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP 
Server.  

Security Fix(es):  

  * php: host/secure cookie bypass due to partial CVE-2022-31629 fix 
(CVE-2024-2756)
  * php: password_verify can erroneously return true, opening ATO risk 
(CVE-2024-3096)
  * php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458)
  * php: Erroneous parsing of multipart form data (CVE-2024-8925)
  * php: cgi.force_redirect configuration is bypassable due to the environment 
variable collision (CVE-2024-8927)
  * php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026)


For more details about the security issue(s), including the impact, a CVSS 
score, acknowledgments, and other related information, refer to the CVE page(s) 
listed in the References section.


Full details, updated packages, references, and other related information: 
https://errata.almalinux.org/9/ALSA-2024-10950.html

This message is automatically generated, please don’t reply. For further 
questions, please, contact us via the AlmaLinux community chat: 
https://chat.almalinux.org/.
Want to change your notification settings? Sign in and manage mailing lists on 
https://lists.almalinux.org.

Kind regards,
AlmaLinux Team

Reply via email to