CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
60.6%
An update is available for module.php-pecl-apcu, module.php, php, libzip, module.php-pear, module.php-pecl-xdebug3, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-rrd, php-pecl-zip, module.libzip, php-pecl-xdebug3, php-pecl-apcu, php-pear.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
php: XML loading external entity without being enabled (CVE-2023-3823)
php: phar Buffer mismanagement (CVE-2023-3824)
php: 1-byte array overrun in common path resolve code (CVE-2023-0568)
php: DoS vulnerability when parsing multipart request body (CVE-2023-0662)
php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247)
php: Password_verify() always return true with some hash (CVE-2023-0567)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.