[CLSA-2024:1734368090] php: Fix of CVE-2023-3824
Type:
security
Severity:
Critical
Release date:
2024-12-16 16:54:55 UTC
Description:
- CVE-2023-3824: Update length checking in PHAR directory entries reading to prevent stack buffer overflow and potential memory corruption or RCE
Updated packages:
  • php-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:9b7a67181f97694f96b9c9d94ddf534ab5b0ddbc5b145450e033a8a0a9d2b5d3
  • php-bcmath-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:ff87f778085ed5ea9f0976306790dfc26d9e6e39a40cbfcabe14afc1d1e54647
  • php-cli-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:6918807b333f1f486d15619036f0f9e83ad037d5bbe00658bce8255a4010ac13
  • php-common-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:8a87e068bd7715de61df79af993f98db318ce45dc0651a0d2bfc8e7c7ac138f9
  • php-dba-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:5962f5951fed67a4ffcccc7350b5809e25b4aad72609a587167c2181a73a00b6
  • php-dbg-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:66ee6def624990b41e63c3f4de587999caabff0c6389125033816b566a9cd05e
  • php-devel-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:75aab23305117307f5ec0d5e0aed8306701236657c92e9d5b5f0cb44a74dd70b
  • php-embedded-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:c8f166a8d05663750aacf3e8c7011d8534604e7cd15611fcea1d982626336198
  • php-enchant-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:4be0c829bf6a92261229081ff0cd3d8ce87401bfd1a2805043611cad5e0139aa
  • php-fpm-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:2ce8ebeec328c412c1685a4b1b4fc71d8b3b7c32862e189aae0c9d65c8053dbc
  • php-gd-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:911597fde89a74cdfb5a3b275d81426a454da5d6a9e650a42ea55e98a1b06097
  • php-gmp-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:d20a3b70c468306da2f80954aef605fdae4ded8e069d4b9628dcc432426be8a9
  • php-intl-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:b5695e2758e22fdc2f67feb06d2475b785e5a22293163700d9c427d0e09d6c23
  • php-json-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:322ffea7913466f9ae40826fb56e80500b4fb8863170a63365659a086e585e8a
  • php-ldap-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:19ac9b2bd27d5fce2dac1f88c2968ffc22376f8a11dd870b69c6cffb0ad1acaf
  • php-mbstring-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:c01678618fbcdbe611253ec9c9c783ab4b512f61b85c1ef1fdf7c79007359e93
  • php-mysqlnd-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:c8171f816c669db6c61690ebde5f469d3591317ad6f18e406193da96fdf60565
  • php-odbc-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:efc830838d78491ee61bbed5e495c8359022bdb9257b0ca85d36c01635ba4fdf
  • php-opcache-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:8d35d79b25f4bd26f809d0fe2a315e6bd772dc13dbeb10496d850119d3bd89e6
  • php-pdo-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:70c686c14e5df096c5cc316e0b0f3c722fd6c27a99ed12fe47fa6f7d725e5a2d
  • php-pgsql-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:536d884fc064d09d025926a5a7059095743e37e5d4ab43e7e869e23f8b988712
  • php-process-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:44901e2dd089a5722c82e5bbe4f991243224e2c5a39832e34f451a926f7a8a80
  • php-recode-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:a011e66f0f9d632e153cc8cc9b1dce400e7865cda81dec8218cb28064444b115
  • php-snmp-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:afa21ddc34ad10c215d386642f000ddac703c56f62789ef94e5f8b89ff89ceca
  • php-soap-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:cc45ab1d937fad00c8ba602bc7731561ba53598903fb9c9f435c4c445b277648
  • php-xml-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:16ed180002f46af7acfb67d9bcc4f4f5f451b76a61663628b510f7afbc2b6693
  • php-xmlrpc-7.2.24-1.module_el8+2244+0e09a123.tuxcare.els4.x86_64.rpm
    sha:d0f4cceb3d15786f3059b6d7f01b07977d868e60721d0723e7ee270c279b286c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.