**Issue Overview:**
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space. (CVE-2023-0662)
**Affected Packages:**
php56
**Issue Correction:**
Run _yum update php56_ to update your system.
**New Packages:**
i686:
php56-pgsql-5.6.40-1.144.amzn1.i686
php56-opcache-5.6.40-1.144.amzn1.i686
php56-xmlrpc-5.6.40-1.144.amzn1.i686
php56-pdo-5.6.40-1.144.amzn1.i686
php56-embedded-5.6.40-1.144.amzn1.i686
php56-mcrypt-5.6.40-1.144.amzn1.i686
php56-enchant-5.6.40-1.144.amzn1.i686
php56-fpm-5.6.40-1.144.amzn1.i686
php56-gmp-5.6.40-1.144.amzn1.i686
php56-snmp-5.6.40-1.144.amzn1.i686
php56-gd-5.6.40-1.144.amzn1.i686
php56-dbg-5.6.40-1.144.amzn1.i686
php56-intl-5.6.40-1.144.amzn1.i686
php56-process-5.6.40-1.144.amzn1.i686
php56-common-5.6.40-1.144.amzn1.i686
php56-recode-5.6.40-1.144.amzn1.i686
php56-debuginfo-5.6.40-1.144.amzn1.i686
php56-pspell-5.6.40-1.144.amzn1.i686
php56-mssql-5.6.40-1.144.amzn1.i686
php56-devel-5.6.40-1.144.amzn1.i686
php56-soap-5.6.40-1.144.amzn1.i686
php56-cli-5.6.40-1.144.amzn1.i686
php56-bcmath-5.6.40-1.144.amzn1.i686
php56-tidy-5.6.40-1.144.amzn1.i686
php56-imap-5.6.40-1.144.amzn1.i686
php56-mbstring-5.6.40-1.144.amzn1.i686
php56-5.6.40-1.144.amzn1.i686
php56-ldap-5.6.40-1.144.amzn1.i686
php56-mysqlnd-5.6.40-1.144.amzn1.i686
php56-odbc-5.6.40-1.144.amzn1.i686
php56-dba-5.6.40-1.144.amzn1.i686
php56-xml-5.6.40-1.144.amzn1.i686
src:
php56-5.6.40-1.144.amzn1.src
x86_64:
php56-mbstring-5.6.40-1.144.amzn1.x86_64
php56-recode-5.6.40-1.144.amzn1.x86_64
php56-imap-5.6.40-1.144.amzn1.x86_64
php56-gmp-5.6.40-1.144.amzn1.x86_64
php56-tidy-5.6.40-1.144.amzn1.x86_64
php56-cli-5.6.40-1.144.amzn1.x86_64
php56-process-5.6.40-1.144.amzn1.x86_64
php56-embedded-5.6.40-1.144.amzn1.x86_64
php56-ldap-5.6.40-1.144.amzn1.x86_64
php56-debuginfo-5.6.40-1.144.amzn1.x86_64
php56-dba-5.6.40-1.144.amzn1.x86_64
php56-mcrypt-5.6.40-1.144.amzn1.x86_64
php56-opcache-5.6.40-1.144.amzn1.x86_64
php56-dbg-5.6.40-1.144.amzn1.x86_64
php56-odbc-5.6.40-1.144.amzn1.x86_64
php56-bcmath-5.6.40-1.144.amzn1.x86_64
php56-common-5.6.40-1.144.amzn1.x86_64
php56-pgsql-5.6.40-1.144.amzn1.x86_64
php56-enchant-5.6.40-1.144.amzn1.x86_64
php56-soap-5.6.40-1.144.amzn1.x86_64
php56-devel-5.6.40-1.144.amzn1.x86_64
php56-mssql-5.6.40-1.144.amzn1.x86_64
php56-pdo-5.6.40-1.144.amzn1.x86_64
php56-intl-5.6.40-1.144.amzn1.x86_64
php56-5.6.40-1.144.amzn1.x86_64
php56-xmlrpc-5.6.40-1.144.amzn1.x86_64
php56-snmp-5.6.40-1.144.amzn1.x86_64
php56-pspell-5.6.40-1.144.amzn1.x86_64
php56-mysqlnd-5.6.40-1.144.amzn1.x86_64
php56-fpm-5.6.40-1.144.amzn1.x86_64
php56-gd-5.6.40-1.144.amzn1.x86_64
php56-xml-5.6.40-1.144.amzn1.x86_64
### Additional References
Red Hat: [CVE-2023-0662]()
Mitre: [CVE-2023-0662]()Read More
References
Back to Main