Hi,

You are receiving an AlmaLinux Security update email because you subscribed to 
receive errata notifications from AlmaLinux.

AlmaLinux: 8
Type: Security
Severity: Moderate
Release date: 2023-05-19

Summary:

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP 
Server.

The following packages have been upgraded to a later upstream version: php 
(7.4.33).

Security Fix(es):

* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
* php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' 
cookie by PHP applications (CVE-2022-31629)
* php: OOB read due to insufficient input validation in imageloadfont() 
(CVE-2022-31630)
* php: PDO::quote() may return unquoted string due to an integer overflow 
(CVE-2022-31631)
* php: phar: infinite loop when decompressing quine gzip file (CVE-2022-31628)

For more details about the security issue(s), including the impact, a CVSS 
score, acknowledgments, and other related information, refer to the CVE page(s) 
listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release 
Notes linked from the References section.

Full details, updated packages, references, and other related information: 
https://errata.almalinux.org/8/ALSA-2023-2903.html

This message is automatically generated, please don’t reply. For further 
questions, please, contact us via the AlmaLinux community chat: 
https://chat.almalinux.org/.
Want to change your notification settings? Sign in and manage mailing lists on 
https://lists.almalinux.org.

Kind regards,
AlmaLinux Team

Reply via email to