RLSA-2023:5926

Source
https://errata.rockylinux.org/RLSA-2023:5926
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:5926.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:5926
Related
Published
2023-10-24T18:36:55.667001Z
Modified
2023-10-24T18:37:54.255462Z
Summary
Important: php security update
Details

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

Security Fix(es):

  • php: XML loading external entity without being enabled (CVE-2023-3823)

  • php: phar Buffer mismanagement (CVE-2023-3824)

  • php: 1-byte array overrun in common path resolve code (CVE-2023-0568)

  • php: DoS vulnerability when parsing multipart request body (CVE-2023-0662)

  • php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247)

  • php: Password_verify() always return true with some hash (CVE-2023-0567)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / php

Package

Name
php
Purl
pkg:rpm/rocky-linux/php?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:8.0.30-1.el9_2