[ALSA-2022:5468] ALSA-2022:5468: php:8.0 security update (Important)
Type:
security
Severity:
important
Release date:
2023-03-13
Description:
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
noarch php-pear-1.10.13-1.module_el8.6.0+3268+b150a051.noarch.rpm 0cce4d216b43c4b38de6e0f49d7e0705d81c35d448903204b93b913865a2007c
noarch apcu-panel-5.1.20-1.module_el8.6.0+2739+efabdb8f.noarch.rpm 9d62eacacacb9526989ff157092bfe3f43de1faab5ec35b299d8c04eb847a216
x86_64 php-pecl-rrd-2.0.3-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm 17854bfaccfa9a5dac2ebbee4ecbfed7162e36b265a23d65ca19c56e67c8d339
x86_64 libzip-tools-1.7.3-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm 3a875aed6f027f47929142afa0af9aa7ac16e0d65a3dd6913ed408b6e08237be
x86_64 libzip-devel-1.7.3-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm 510ca816c904c997067280f1a8c44545212d9d21281831123c599aab29ea1325
x86_64 php-pecl-xdebug3-3.1.2-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm 686c10d578ee64745364e6d127c86034519c9492ef08d946be8dd089d7fde8ae
x86_64 php-pecl-apcu-devel-5.1.20-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm cf0f1163631368e3c11500cc5a9aef526abe256cf2357dbda4eb9e2c041c4dee
x86_64 php-pecl-apcu-5.1.20-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm db2b2892daa3ec57184419a8d33ccc05828d55bcc1e88c5e81356a0882bc180a
x86_64 libzip-1.7.3-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm e28e71e7935846d35ad3ae4b5a46e00d76b60be0453f3f30431ad4af7a429df1
x86_64 php-pecl-zip-1.19.2-1.module_el8.6.0+2739+efabdb8f.x86_64.rpm fe1679b1f0e950ac5e52a203849eb0a715083b74888819deedeaeae67428d9bf
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.