Moderate: php:8.0 security update

Related Vulnerabilities: CVE-2022-31628   CVE-2022-31629   CVE-2022-31630   CVE-2022-31631   CVE-2022-37454  

Synopsis

Moderate: php:8.0 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the php:8.0 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (8.0). (BZ#2161666)

Security Fix(es):

  • XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
  • php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629)
  • php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
  • php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)
  • php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2133687 - CVE-2022-31629 php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
  • BZ - 2133688 - CVE-2022-31628 php: phar: infinite loop when decompressing quine gzip file
  • BZ - 2139280 - CVE-2022-31630 php: OOB read due to insufficient input validation in imageloadfont()
  • BZ - 2140200 - CVE-2022-37454 XKCP: buffer overflow in the SHA-3 reference implementation
  • BZ - 2158791 - CVE-2022-31631 php: PDO::quote() may return unquoted string due to an integer overflow