|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2024-4577: php5,php53,php7,php72,php74,php8: argument Injection in PHP-CGI, bypass of CVE-2012-1823 | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Petr Gajdos <pgajdos> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | andrea.mattiazzo |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/409036/ | ||
| Whiteboard: | |||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-06-07 07:45:24 UTC
The vulnerability only affect Windows due to the Best-Fit feature of encoding conversion, so we are not affected. https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ This is an autogenerated message for OBS integration: This bug (1226072) was mentioned in https://build.opensuse.org/request/show/1179149 Factory / php8 |