{"id":"RLSA-2024:10952","summary":"Moderate: php:7.4 security update","details":"PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.\n\nSecurity Fix(es):\n\n* php: 1-byte array overrun in common path resolve code (CVE-2023-0568)\n\n* php: Password_verify() always return true with some hash (CVE-2023-0567)\n\n* php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247)\n\n* php: XML loading external entity without being enabled (CVE-2023-3823)\n\n* php: phar Buffer mismanagement (CVE-2023-3824)\n\n* php: host/secure cookie bypass due to partial CVE-2022-31629 fix (CVE-2024-2756)\n\n* php: password_verify can erroneously return true, opening ATO risk (CVE-2024-3096)\n\n* php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458)\n\n* php: Erroneous parsing of multipart form data (CVE-2024-8925)\n\n* php: cgi.force_redirect configuration is bypassable due to the environment variable collision (CVE-2024-8927)\n\n* php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T07:40:19.827724Z","published":"2024-12-19T04:18:05.672002Z","upstream":["CVE-2023-0567","CVE-2023-0568","CVE-2023-3247","CVE-2023-3823","CVE-2023-3824","CVE-2024-2756","CVE-2024-3096","CVE-2024-5458","CVE-2024-8925","CVE-2024-8927","CVE-2024-9026"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:10952"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170770"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170771"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219290"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2229396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230101"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275058"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275061"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2291252"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317049"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317051"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317144"}],"affected":[{"package":{"name":"libzip","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/libzip?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.6.1-1.module+el8.10.0+1604+6558efc7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:10952.json"}},{"package":{"name":"php","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.33-2.module+el8.10.0+1912+72767185"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:10952.json"}},{"package":{"name":"php-pear","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pear?distro=rocky-linux-8&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.10.13-1.module+el8.10.0+1604+6558efc7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:10952.json"}},{"package":{"name":"php-pecl-apcu","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pecl-apcu?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.1.18-1.module+el8.10.0+1604+6558efc7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:10952.json"}},{"package":{"name":"php-pecl-rrd","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pecl-rrd?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.1-1.module+el8.10.0+1604+6558efc7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:10952.json"}},{"package":{"name":"php-pecl-xdebug","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pecl-xdebug?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.9.5-1.module+el8.10.0+1604+6558efc7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:10952.json"}},{"package":{"name":"php-pecl-zip","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/php-pecl-zip?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.18.2-1.module+el8.10.0+1604+6558efc7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:10952.json"}}],"schema_version":"1.7.3","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}