-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: php security, bug fix, and enhancement update Advisory ID: RHSA-2022:8197-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:8197 Issue date: 2022-11-15 CVE Names: CVE-2021-21708 CVE-2022-31625 ==================================================================== 1. Summary: An update for php is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 9) - aarch64, ppc64le, s390x, x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2095752) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2055879 - CVE-2021-21708 php: Use after free due to php_filter_float() failing for ints 2095447 - php-fpm has an odd Requires 2095752 - Rebase to 8.0.20 2098521 - CVE-2022-31625 php: Uninitialized array in pg_query_params() leading to RCE 2104630 - PHP 8 snmp3 Calls Using authPriv or authNoPriv Immediately Return False Without Error Message 6. Package List: Red Hat Enterprise Linux AppStream (v. 9): Source: php-8.0.20-3.el9.src.rpm aarch64: php-8.0.20-3.el9.aarch64.rpm php-bcmath-8.0.20-3.el9.aarch64.rpm php-bcmath-debuginfo-8.0.20-3.el9.aarch64.rpm php-cli-8.0.20-3.el9.aarch64.rpm php-cli-debuginfo-8.0.20-3.el9.aarch64.rpm php-common-8.0.20-3.el9.aarch64.rpm php-common-debuginfo-8.0.20-3.el9.aarch64.rpm php-dba-8.0.20-3.el9.aarch64.rpm php-dba-debuginfo-8.0.20-3.el9.aarch64.rpm php-dbg-8.0.20-3.el9.aarch64.rpm php-dbg-debuginfo-8.0.20-3.el9.aarch64.rpm php-debuginfo-8.0.20-3.el9.aarch64.rpm php-debugsource-8.0.20-3.el9.aarch64.rpm php-devel-8.0.20-3.el9.aarch64.rpm php-embedded-8.0.20-3.el9.aarch64.rpm php-embedded-debuginfo-8.0.20-3.el9.aarch64.rpm php-enchant-8.0.20-3.el9.aarch64.rpm php-enchant-debuginfo-8.0.20-3.el9.aarch64.rpm php-ffi-8.0.20-3.el9.aarch64.rpm php-ffi-debuginfo-8.0.20-3.el9.aarch64.rpm php-fpm-8.0.20-3.el9.aarch64.rpm php-fpm-debuginfo-8.0.20-3.el9.aarch64.rpm php-gd-8.0.20-3.el9.aarch64.rpm php-gd-debuginfo-8.0.20-3.el9.aarch64.rpm php-gmp-8.0.20-3.el9.aarch64.rpm php-gmp-debuginfo-8.0.20-3.el9.aarch64.rpm php-intl-8.0.20-3.el9.aarch64.rpm php-intl-debuginfo-8.0.20-3.el9.aarch64.rpm php-ldap-8.0.20-3.el9.aarch64.rpm php-ldap-debuginfo-8.0.20-3.el9.aarch64.rpm php-mbstring-8.0.20-3.el9.aarch64.rpm php-mbstring-debuginfo-8.0.20-3.el9.aarch64.rpm php-mysqlnd-8.0.20-3.el9.aarch64.rpm php-mysqlnd-debuginfo-8.0.20-3.el9.aarch64.rpm php-odbc-8.0.20-3.el9.aarch64.rpm php-odbc-debuginfo-8.0.20-3.el9.aarch64.rpm php-opcache-8.0.20-3.el9.aarch64.rpm php-opcache-debuginfo-8.0.20-3.el9.aarch64.rpm php-pdo-8.0.20-3.el9.aarch64.rpm php-pdo-debuginfo-8.0.20-3.el9.aarch64.rpm php-pgsql-8.0.20-3.el9.aarch64.rpm php-pgsql-debuginfo-8.0.20-3.el9.aarch64.rpm php-process-8.0.20-3.el9.aarch64.rpm php-process-debuginfo-8.0.20-3.el9.aarch64.rpm php-snmp-8.0.20-3.el9.aarch64.rpm php-snmp-debuginfo-8.0.20-3.el9.aarch64.rpm php-soap-8.0.20-3.el9.aarch64.rpm php-soap-debuginfo-8.0.20-3.el9.aarch64.rpm php-xml-8.0.20-3.el9.aarch64.rpm php-xml-debuginfo-8.0.20-3.el9.aarch64.rpm ppc64le: php-8.0.20-3.el9.ppc64le.rpm php-bcmath-8.0.20-3.el9.ppc64le.rpm php-bcmath-debuginfo-8.0.20-3.el9.ppc64le.rpm php-cli-8.0.20-3.el9.ppc64le.rpm php-cli-debuginfo-8.0.20-3.el9.ppc64le.rpm php-common-8.0.20-3.el9.ppc64le.rpm php-common-debuginfo-8.0.20-3.el9.ppc64le.rpm php-dba-8.0.20-3.el9.ppc64le.rpm php-dba-debuginfo-8.0.20-3.el9.ppc64le.rpm php-dbg-8.0.20-3.el9.ppc64le.rpm php-dbg-debuginfo-8.0.20-3.el9.ppc64le.rpm php-debuginfo-8.0.20-3.el9.ppc64le.rpm php-debugsource-8.0.20-3.el9.ppc64le.rpm php-devel-8.0.20-3.el9.ppc64le.rpm php-embedded-8.0.20-3.el9.ppc64le.rpm php-embedded-debuginfo-8.0.20-3.el9.ppc64le.rpm php-enchant-8.0.20-3.el9.ppc64le.rpm php-enchant-debuginfo-8.0.20-3.el9.ppc64le.rpm php-ffi-8.0.20-3.el9.ppc64le.rpm php-ffi-debuginfo-8.0.20-3.el9.ppc64le.rpm php-fpm-8.0.20-3.el9.ppc64le.rpm php-fpm-debuginfo-8.0.20-3.el9.ppc64le.rpm php-gd-8.0.20-3.el9.ppc64le.rpm php-gd-debuginfo-8.0.20-3.el9.ppc64le.rpm php-gmp-8.0.20-3.el9.ppc64le.rpm php-gmp-debuginfo-8.0.20-3.el9.ppc64le.rpm php-intl-8.0.20-3.el9.ppc64le.rpm php-intl-debuginfo-8.0.20-3.el9.ppc64le.rpm php-ldap-8.0.20-3.el9.ppc64le.rpm php-ldap-debuginfo-8.0.20-3.el9.ppc64le.rpm php-mbstring-8.0.20-3.el9.ppc64le.rpm php-mbstring-debuginfo-8.0.20-3.el9.ppc64le.rpm php-mysqlnd-8.0.20-3.el9.ppc64le.rpm php-mysqlnd-debuginfo-8.0.20-3.el9.ppc64le.rpm php-odbc-8.0.20-3.el9.ppc64le.rpm php-odbc-debuginfo-8.0.20-3.el9.ppc64le.rpm php-opcache-8.0.20-3.el9.ppc64le.rpm php-opcache-debuginfo-8.0.20-3.el9.ppc64le.rpm php-pdo-8.0.20-3.el9.ppc64le.rpm php-pdo-debuginfo-8.0.20-3.el9.ppc64le.rpm php-pgsql-8.0.20-3.el9.ppc64le.rpm php-pgsql-debuginfo-8.0.20-3.el9.ppc64le.rpm php-process-8.0.20-3.el9.ppc64le.rpm php-process-debuginfo-8.0.20-3.el9.ppc64le.rpm php-snmp-8.0.20-3.el9.ppc64le.rpm php-snmp-debuginfo-8.0.20-3.el9.ppc64le.rpm php-soap-8.0.20-3.el9.ppc64le.rpm php-soap-debuginfo-8.0.20-3.el9.ppc64le.rpm php-xml-8.0.20-3.el9.ppc64le.rpm php-xml-debuginfo-8.0.20-3.el9.ppc64le.rpm s390x: php-8.0.20-3.el9.s390x.rpm php-bcmath-8.0.20-3.el9.s390x.rpm php-bcmath-debuginfo-8.0.20-3.el9.s390x.rpm php-cli-8.0.20-3.el9.s390x.rpm php-cli-debuginfo-8.0.20-3.el9.s390x.rpm php-common-8.0.20-3.el9.s390x.rpm php-common-debuginfo-8.0.20-3.el9.s390x.rpm php-dba-8.0.20-3.el9.s390x.rpm php-dba-debuginfo-8.0.20-3.el9.s390x.rpm php-dbg-8.0.20-3.el9.s390x.rpm php-dbg-debuginfo-8.0.20-3.el9.s390x.rpm php-debuginfo-8.0.20-3.el9.s390x.rpm php-debugsource-8.0.20-3.el9.s390x.rpm php-devel-8.0.20-3.el9.s390x.rpm php-embedded-8.0.20-3.el9.s390x.rpm php-embedded-debuginfo-8.0.20-3.el9.s390x.rpm php-enchant-8.0.20-3.el9.s390x.rpm php-enchant-debuginfo-8.0.20-3.el9.s390x.rpm php-ffi-8.0.20-3.el9.s390x.rpm php-ffi-debuginfo-8.0.20-3.el9.s390x.rpm php-fpm-8.0.20-3.el9.s390x.rpm php-fpm-debuginfo-8.0.20-3.el9.s390x.rpm php-gd-8.0.20-3.el9.s390x.rpm php-gd-debuginfo-8.0.20-3.el9.s390x.rpm php-gmp-8.0.20-3.el9.s390x.rpm php-gmp-debuginfo-8.0.20-3.el9.s390x.rpm php-intl-8.0.20-3.el9.s390x.rpm php-intl-debuginfo-8.0.20-3.el9.s390x.rpm php-ldap-8.0.20-3.el9.s390x.rpm php-ldap-debuginfo-8.0.20-3.el9.s390x.rpm php-mbstring-8.0.20-3.el9.s390x.rpm php-mbstring-debuginfo-8.0.20-3.el9.s390x.rpm php-mysqlnd-8.0.20-3.el9.s390x.rpm php-mysqlnd-debuginfo-8.0.20-3.el9.s390x.rpm php-odbc-8.0.20-3.el9.s390x.rpm php-odbc-debuginfo-8.0.20-3.el9.s390x.rpm php-opcache-8.0.20-3.el9.s390x.rpm php-opcache-debuginfo-8.0.20-3.el9.s390x.rpm php-pdo-8.0.20-3.el9.s390x.rpm php-pdo-debuginfo-8.0.20-3.el9.s390x.rpm php-pgsql-8.0.20-3.el9.s390x.rpm php-pgsql-debuginfo-8.0.20-3.el9.s390x.rpm php-process-8.0.20-3.el9.s390x.rpm php-process-debuginfo-8.0.20-3.el9.s390x.rpm php-snmp-8.0.20-3.el9.s390x.rpm php-snmp-debuginfo-8.0.20-3.el9.s390x.rpm php-soap-8.0.20-3.el9.s390x.rpm php-soap-debuginfo-8.0.20-3.el9.s390x.rpm php-xml-8.0.20-3.el9.s390x.rpm php-xml-debuginfo-8.0.20-3.el9.s390x.rpm x86_64: php-8.0.20-3.el9.x86_64.rpm php-bcmath-8.0.20-3.el9.x86_64.rpm php-bcmath-debuginfo-8.0.20-3.el9.x86_64.rpm php-cli-8.0.20-3.el9.x86_64.rpm php-cli-debuginfo-8.0.20-3.el9.x86_64.rpm php-common-8.0.20-3.el9.x86_64.rpm php-common-debuginfo-8.0.20-3.el9.x86_64.rpm php-dba-8.0.20-3.el9.x86_64.rpm php-dba-debuginfo-8.0.20-3.el9.x86_64.rpm php-dbg-8.0.20-3.el9.x86_64.rpm php-dbg-debuginfo-8.0.20-3.el9.x86_64.rpm php-debuginfo-8.0.20-3.el9.x86_64.rpm php-debugsource-8.0.20-3.el9.x86_64.rpm php-devel-8.0.20-3.el9.x86_64.rpm php-embedded-8.0.20-3.el9.x86_64.rpm php-embedded-debuginfo-8.0.20-3.el9.x86_64.rpm php-enchant-8.0.20-3.el9.x86_64.rpm php-enchant-debuginfo-8.0.20-3.el9.x86_64.rpm php-ffi-8.0.20-3.el9.x86_64.rpm php-ffi-debuginfo-8.0.20-3.el9.x86_64.rpm php-fpm-8.0.20-3.el9.x86_64.rpm php-fpm-debuginfo-8.0.20-3.el9.x86_64.rpm php-gd-8.0.20-3.el9.x86_64.rpm php-gd-debuginfo-8.0.20-3.el9.x86_64.rpm php-gmp-8.0.20-3.el9.x86_64.rpm php-gmp-debuginfo-8.0.20-3.el9.x86_64.rpm php-intl-8.0.20-3.el9.x86_64.rpm php-intl-debuginfo-8.0.20-3.el9.x86_64.rpm php-ldap-8.0.20-3.el9.x86_64.rpm php-ldap-debuginfo-8.0.20-3.el9.x86_64.rpm php-mbstring-8.0.20-3.el9.x86_64.rpm php-mbstring-debuginfo-8.0.20-3.el9.x86_64.rpm php-mysqlnd-8.0.20-3.el9.x86_64.rpm php-mysqlnd-debuginfo-8.0.20-3.el9.x86_64.rpm php-odbc-8.0.20-3.el9.x86_64.rpm php-odbc-debuginfo-8.0.20-3.el9.x86_64.rpm php-opcache-8.0.20-3.el9.x86_64.rpm php-opcache-debuginfo-8.0.20-3.el9.x86_64.rpm php-pdo-8.0.20-3.el9.x86_64.rpm php-pdo-debuginfo-8.0.20-3.el9.x86_64.rpm php-pgsql-8.0.20-3.el9.x86_64.rpm php-pgsql-debuginfo-8.0.20-3.el9.x86_64.rpm php-process-8.0.20-3.el9.x86_64.rpm php-process-debuginfo-8.0.20-3.el9.x86_64.rpm php-snmp-8.0.20-3.el9.x86_64.rpm php-snmp-debuginfo-8.0.20-3.el9.x86_64.rpm php-soap-8.0.20-3.el9.x86_64.rpm php-soap-debuginfo-8.0.20-3.el9.x86_64.rpm php-xml-8.0.20-3.el9.x86_64.rpm php-xml-debuginfo-8.0.20-3.el9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-21708 https://access.redhat.com/security/cve/CVE-2022-31625 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY3OMW9zjgjWX9erEAQj/kg/9GSYTpNzlEIlJZov+EWGaAKzxPB7NoVQ/ cLTon+/fVVU0qBcxoxWA3O56UxYi8lifl62aMvFUbihLsC76QTteLAkwasjWWAyg Hl0/+tg6OzOaV6zmMyr/Y+RcM4+NhvQj1+ECj1sx8FXSypgOFhi7bXDM5XfjnOTh K+jd2LY16YBzbvf7hcOsZxqMsNANwCWIWJC8kc41ARM/FREx+cy/R3MsdmHQ+Ucn zr5AUORu92rUW4qgsoNcR4wzUKvhulN8ZVgix8IRh+OsDZWB/EMiKIml99pQG/Vi Nl/wPNOpIZHBHDOSDg0BGMJz0Z+w//mp+m9XDk0KKA3wSoH4L4tl+w6ZIunP/mr/ CiWPnMySwdlBCIQ64D2kICErN9g63u04t8PUgQfQKiFpObiaLcYwfed1kr4dpIki co4nCrF6CwknSn5cDF4cp5Y3pcN/dSsd2WdLN756Ebf0osfuqh6q3Pwoc/Jfp9uG YAgw/kli1sjl3YiG/nfuDVJBid8kS8ylymkUSDgfii7tMHLcnLnCk7deI40qDMUa p28RFPjNY27uCQURvi5oUzflsDo08otNYVq0/fQhGC2UrPWglyC4ClGp2GArag06 i3kCsjDAiyRcavAh4KcymbWsVaTDyZOeWNAEJlcko2jjFARjFtNkmoMaa98uIEmP PRH5jXRX0+gµpo -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce