Update dependency composer/composer to >=2.2.24 <2.3.0 [SECURITY] - autoclosed #56
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
>=1.9.0 <2.3.0
->>=2.2.24 <2.3.0
GitHub Vulnerability Alerts
CVE-2023-43655
Impact
Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be impacted if PHP also has
register_argc_argv
enabled in php.ini.Patches
2.6.4, 2.2.22 and 1.10.27 patch this vulnerability.
Workarounds
Make sure
register_argc_argv
is disabled in php.ini, and avoid publishing composer.phar to the web as this really should not happen.CVE-2024-24821
Impact
Several files within the local working directory are included during the invocation of Composer and in the context of the executing user.
As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files.
All Composer CLI commands are affected, including composer.phar's self-update.
The following are of high risk:
Patches
2.7.0, 2.2.23
Workarounds
Where not possible, the following should be addressed:
vendor/composer/InstalledVersions.php
andvendor/composer/installed.php
do not include untrusted code.A reset can also be done on these files by the following:
CVE-2024-35242
Impact
The
composer install
command running inside a git/hg repository which has specially crafted branch names can lead to command injection. So this requires cloning untrusted repositories.Patches
2.2.24 for 2.2 LTS or 2.7.7 for mainline
Workarounds
Avoid cloning potentially compromised repositories.
CVE-2024-35241
Impact
The
status
,reinstall
andremove
commands with packages installed from source via git containing specially crafted branch names in the repository can be used to execute code.Patches
2.2.24 for 2.2 LTS or 2.7.7 for mainline
Workarounds
Avoid installing dependencies via git by using
--prefer-dist
or thepreferred-install: dist
config setting.Release Notes
composer/composer (composer/composer)
v2.2.24
Compare Source
This release includes fixes for issues found in a security audit by Cure53 funded by Alpha-Omega.
fa3b958
)3c37a67
)3773f77
)de5f7e3
)3130a74
,04a63b3
)v2.2.23
Compare Source
v2.2.22
Compare Source
%
signs (#11359)v2.2.21
Compare Source
v2.2.20
Compare Source
v2.2.19
Compare Source
_
to avoid conflicts between package names likea-b
anda_b
(#11229)COMPOSER_DISCARD_CHANGES
when set to0
Configuration
📅 Schedule: Branch creation - "" in timezone UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Read more information about the use of Renovate Bot within Laminas.