CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
91.2%
An update is available for php-pear, php-pecl-xdebug3, module.php-pecl-apcu, php-pecl-rrd, module.php-pecl-zip, module.php-pecl-xdebug3, module.php, libzip, php-pecl-apcu, module.php-pecl-rrd, php, module.libzip, php-pecl-zip, module.php-pear.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0). (BZ#2161666)
Security Fix(es):
XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
php: standard insecure cookie could be treated as a __Host-
or __Secure-
cookie by PHP applications (CVE-2022-31629)
php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)
php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.