vulnerability
Amazon Linux AMI 2: CVE-2024-9026: Security patch for php (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:S/C:N/I:P/A:N) | Oct 8, 2024 | Feb 26, 2025 | Feb 26, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:S/C:N/I:P/A:N)
Published
Oct 8, 2024
Added
Feb 26, 2025
Modified
Feb 26, 2025
Description
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
Solutions
amazon-linux-ami-2-upgrade-phpamazon-linux-ami-2-upgrade-php-bcmathamazon-linux-ami-2-upgrade-php-cliamazon-linux-ami-2-upgrade-php-commonamazon-linux-ami-2-upgrade-php-dbaamazon-linux-ami-2-upgrade-php-dbgamazon-linux-ami-2-upgrade-php-debuginfoamazon-linux-ami-2-upgrade-php-develamazon-linux-ami-2-upgrade-php-embeddedamazon-linux-ami-2-upgrade-php-enchantamazon-linux-ami-2-upgrade-php-fpmamazon-linux-ami-2-upgrade-php-gdamazon-linux-ami-2-upgrade-php-gmpamazon-linux-ami-2-upgrade-php-intlamazon-linux-ami-2-upgrade-php-ldapamazon-linux-ami-2-upgrade-php-mbstringamazon-linux-ami-2-upgrade-php-mysqlndamazon-linux-ami-2-upgrade-php-odbcamazon-linux-ami-2-upgrade-php-opcacheamazon-linux-ami-2-upgrade-php-pdoamazon-linux-ami-2-upgrade-php-pgsqlamazon-linux-ami-2-upgrade-php-processamazon-linux-ami-2-upgrade-php-pspellamazon-linux-ami-2-upgrade-php-snmpamazon-linux-ami-2-upgrade-php-soapamazon-linux-ami-2-upgrade-php-sodiumamazon-linux-ami-2-upgrade-php-xml
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.