![]() |
|
Message-ID: <aa5efb5f-a06f-4ff7-9a09-79617106335f@oracle.com> Date: Fri, 11 Jul 2025 15:12:49 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: PHP security releases 8.4.10, 8.3.23, 8.2.29, 8.1.33 https://fosstodon.org/@php/114790127424938370 trumpets: > 📣 Announcing the immediate availability of: > > - PHP 8.1.33 > - PHP 8.2.29 > - PHP 8.3.23 > - PHP 8.4.10 > > ‼️ These address the following security issues: > > - Checking errors during escaping in PGSQL > - NULL Pointer Dereference in SOAP > - Null byte termination in hostnames > > 📝 https://www.php.net/ChangeLog-8.php > 🎁 https://www.php.net/downloads > :windows8: https://windows.php.net/download/ The ChangeLog link includes further details: * Fixed GHSA-hrwm-9436-5mv3 (pgsql extension does not check for errors during escaping). (CVE-2025-1735) https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3 * Fixed GHSA-453j-q27h-5p8x (NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix). (CVE-2025-6491) https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x * Fixed GHSA-3cr5-j632-f35r (Null byte termination in hostnames). (CVE-2025-1220) https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.