Alibaba Cloud Linux 3 : 0043: php:7.4 (ALINUX3-SA-2026:0043)

medium Nessus Plugin ID 301015

Synopsis

The remote Alibaba Cloud Linux host is missing one or more security updates.

Description

The remote Alibaba Cloud Linux 3 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALINUX3-SA-2026:0043 advisory.

Package updates are available for Alibaba Cloud Linux 3 that fix the following vulnerabilities:

CVE-2024-11233:
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error inconvert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.

CVE-2024-11234:
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and request_fulluri option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

CVE-2024-8929:
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.

CVE-2025-1217:
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc.

CVE-2025-1219:
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content- typeheader is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations.

CVE-2025-1220:
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters.
This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.

CVE-2025-14177:
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.

CVE-2025-14178:
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.

CVE-2025-1734:
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers.

CVE-2025-1735:
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. Thiscould cause crashes if Postgres server rejects the string as invalid.

CVE-2025-1736:
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted.

CVE-2025-1861:
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.

CVE-2025-6491:
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server.

Tenable has extracted the preceding description block directly from the Alibaba Cloud Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://mirrors.aliyun.com/alinux/3/cve/alinux3-sa-20260043.xml

Plugin Details

Severity: Medium

ID: 301015

File Name: alinux3_sa_2026-0043.nasl

Version: 1.1

Type: local

Published: 3/5/2026

Updated: 3/5/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-1861

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 6.3

Threat Score: 2.9

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Vulnerability Information

CPE: p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-snmp, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-enchant, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-opcache, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-devel, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-mysqlnd, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-dbg, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-cli, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-process, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-ldap, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-gmp, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-json, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-dba, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-odbc, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-gd, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-embedded, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-pgsql, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-xmlrpc, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-bcmath, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-mbstring, cpe:/o:alibabacloud:alibaba_cloud_linux_3, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-common, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-fpm, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-soap, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-xml, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-intl, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-ffi, p-cpe:/a:alibabacloud:alibaba_cloud_linux_3:php-pdo

Required KB Items: Host/local_checks_enabled, Host/Alibaba/release, Host/Alibaba/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/28/2026

Vulnerability Publication Date: 11/19/2024

Reference Information

CVE: CVE-2024-11233, CVE-2024-11234, CVE-2024-8929, CVE-2025-1217, CVE-2025-1219, CVE-2025-1220, CVE-2025-14177, CVE-2025-14178, CVE-2025-1734, CVE-2025-1735, CVE-2025-1736, CVE-2025-1861, CVE-2025-6491