{"id":"RLSA-2023:0965","summary":"Moderate: php security update","details":"PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.\n\nThe following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667)\n\nSecurity Fix(es):\n\n* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)\n\n* php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629)\n\n* php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)\n\n* php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)\n\n* php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-03-11T06:19:49.822178Z","published":"2023-04-06T15:53:36.002725Z","upstream":["CVE-2022-31628","CVE-2022-31629","CVE-2022-31630","CVE-2022-31631","CVE-2022-37454"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2023:0965"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2139280"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2158791"}],"affected":[{"package":{"name":"php","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/php?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.27-1.el9_1"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2023:0965.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}