{"schema_version": "1.7.0", "id": "RLSA-2023:2417", "modified": "2025-12-27T09:08:56.529919Z", "published": "2025-12-27T09:07:08.254940Z", "upstream": ["CVE-2022-31628", "CVE-2022-31629", "CVE-2022-31630", "CVE-2022-31631", "CVE-2022-37454"], "summary": "Moderate: php:8.1 security update", "details": "PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.\n\nThe following packages have been upgraded to a later upstream version: php (8.1.14).\n\nSecurity Fix(es):\n\n* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)\n\n* php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications (CVE-2022-31629)\n\n* php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)\n\n* php: PDO::quote() may return unquoted string due to an integer overflow (CVE-2022-31631)\n\n* php: phar: infinite loop when decompressing quine gzip file (CVE-2022-31628)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "php-pecl-apcu", "purl": "pkg:rpm/rocky-linux/php-pecl-apcu?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:5.1.21-1.module+el9.7.0+40003+454ed3c4"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "php-pecl-rrd", "purl": "pkg:rpm/rocky-linux/php-pecl-rrd?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2.0.3-4.module+el9.7.0+40005+715283ec"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "php-pecl-rrd", "purl": "pkg:rpm/rocky-linux/php-pecl-rrd?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2.0.3-4.module+el9.7.0+40004+bf50a568"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "php-pecl-rrd", "purl": "pkg:rpm/rocky-linux/php-pecl-rrd?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2.0.3-4.module+el9.7.0+40003+454ed3c4"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "php-pecl-xdebug3", "purl": "pkg:rpm/rocky-linux/php-pecl-xdebug3?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:3.1.4-1.module+el9.7.0+40003+454ed3c4"}], "database_specific": {"yum_repository": "AppStream"}}]}, {"package": {"ecosystem": "Rocky Linux:9", "name": "php-pecl-zip", "purl": "pkg:rpm/rocky-linux/php-pecl-zip?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:1.20.1-1.module+el9.7.0+40003+454ed3c4"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2023:2417"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133687"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133688"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139280"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140200"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158791"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}