php:8.2 security update
Discription

image
An update is available for module.libzip, module.php-pecl-apcu, module.php-pecl-xdebug3, module.php-pecl-zip, php-pecl-rrd, module.php-pear, module.php-pecl-rrd, php-pecl-zip, php, libzip, module.php, php-pecl-apcu, php-pecl-xdebug3, php-pear. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): php: host/secure cookie bypass due to partial CVE-2022-31629 fix (CVE-2024-2756) php: password_verify can erroneously return true, opening ATO risk (CVE-2024-3096) php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458) php: Erroneous parsing of multipart form data (CVE-2024-8925) php: cgi.force_redirect configuration is bypassable due to the environment variable collision (CVE-2024-8927) php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References…Read More

Back to Main

Subscribe for the latest news: