First published: Thu Apr 11 2024(Updated: )
Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/php7.0 | <7.0.33-0ubuntu0.16.04.16+ | 7.0.33-0ubuntu0.16.04.16+ |
ubuntu/php7.2 | <7.2.24-0ubuntu0.18.04.17+ | 7.2.24-0ubuntu0.18.04.17+ |
ubuntu/php7.4 | <7.4.3-4ubuntu2.22 | 7.4.3-4ubuntu2.22 |
ubuntu/php8.1 | <8.1.2-1ubuntu2.17 | 8.1.2-1ubuntu2.17 |
ubuntu/php8.1 | <8.1.28 | 8.1.28 |
ubuntu/php8.2 | <8.2.10-2ubuntu2.1 | 8.2.10-2ubuntu2.1 |
ubuntu/php8.2 | <8.2.18 | 8.2.18 |
ubuntu/php8.3 | <8.3.6-0 | 8.3.6-0 |
ubuntu/php8.3 | <8.3.6 | 8.3.6 |
debian/php7.4 | 7.4.33-1+deb11u5 | |
debian/php8.2 | 8.2.20-1~deb12u1 8.2.23-1 | |
redhat/php | <8.1.28 | 8.1.28 |
redhat/php | <8.2.18 | 8.2.18 |
redhat/php | <8.3.6 | 8.3.6 |
PHP | <8.1.28 | 8.1.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.