[CLSA-2025:1753961203] php: Fix of 8 CVEs
Type:
security
Severity:
Critical
Release date:
2025-07-31 11:26:47 UTC
Description:
- CVE-2021-21702: fix null pointer crash because of malformed SOAP server response - CVE-2021-21703: fix error in php fpm shared memory organization leading to privilage escalation - CVE-2022-31625: fix freeing of uninitialized memory leading to RCE - CVE-2022-31626: fix buffer overflow in mysqlnd driver leading to RCE - CVE-2023-0568: fix array overrun when appending slash to paths in DOM and XML cases - CVE-2023-0662: fix DOS vulnerabality by limiting number of parsed multipart body parts and printing upload limit exceed error message only once - CVE-2023-3823: fix external entity loading in XML without enabling it, by sanitizing libxml2 globals before parsing - CVE-2023-3824: fix buffer mismanagement in phar_dir_read()
Updated packages:
  • php-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:8fb05dfff06326ada080a0677aa6a47de0f29d881258729a43dd5b37170f4ed1
  • php-bcmath-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:972b021124a2c19413e49a8de11238f55270e96afe6cfe13555c8765ac676aa2
  • php-cli-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:4b13e72e9f1b4a4ad607124f8ee753fc0ec8228ba9bc4c5b681b9604f4811406
  • php-common-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:5b9f160aa95d3bf19c806e3ba02a7aff766b9bf12dd8773aeb423cb3aeb57c5f
  • php-dba-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:a7bcc0149e2767bf60d4963e83f87b68a5398990e6374973f010db0bab9a9a0f
  • php-devel-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:6a9400c2b07cae66fb3ef75da51ea91b3466a4463a41db4fca998fc2c26dfb67
  • php-embedded-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:63a3e5da35b0c4463a8047ea6865b45286fbca2feccbfc17c6d5d9cfab407e26
  • php-enchant-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:4a2c8a9de074eba55ac850850386f891833e4426f19b4679a1bc3882d65a6108
  • php-fpm-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:0d80e33b3bc86fa1e10526653afb92c5b28694dc94f763abb80575e61c7bb4a0
  • php-gd-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:60dc5920da6615d22048faa1a78b6af758f555e2641588c96604e92d8ae7638d
  • php-intl-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:adcc69002d2723021bf9ea75d8830af96ce1d9cb6c4b99b0894b5342d348e301
  • php-ldap-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:c8051e4b863c1b665579d57a0aa2c74e47de1ebad5e9bd8b0f87993ec09f655a
  • php-mbstring-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:793a3087025883e1efcadc9251fda205f25b964b246657d835f6c59786abe9ad
  • php-mysql-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:e959676ecba0e6387d0cdd7d6c7b8302ad42dae76a1840fcf4ddb1afb5ff3370
  • php-mysqlnd-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:8e433dc3fae25fcfa8ce9946c897768016cb104ebac96f11e3ef65db62078575
  • php-odbc-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:691dd8ca8f324f4ef4a9402a0e8c8ef5a2a260cb28e2ba18c5aff25c04dc566a
  • php-pdo-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:ad255afa6771ea2e626564dd9b34741594217c7072f8dcdb2798dbfcc8bf38a5
  • php-pgsql-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:db337e3b152e009f3dc076e18c01137289477ac0061ece3e59294371e0358b45
  • php-process-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:c3429c9b1ff42fde6e883a72264e5bfe44f16c4474fbaef0d715b43d9badafcf
  • php-pspell-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:ff8f570461954d5e91f24307d8fc38a43497275a9805569696cec1d20c73fc76
  • php-recode-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:51804f92ef8ee3c1907be284148281214a67d36fc1b6c47cdc1b494421a2ab26
  • php-snmp-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:49a615f64b8d2a2ccca273738afa1841770ff17aa0fef275f70b822ce62f2f58
  • php-soap-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:2ead899afd5c19e2b8f32c1e8341a069806db5a449049c9e09866b55e4412e42
  • php-xml-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:24ef6f246a4ed98ab2a6ffc41f5e329b5b5fb07fb876587914dd31d23e17aae4
  • php-xmlrpc-5.4.16-48.el7.tuxcare.els9.x86_64.rpm
    sha:af3acd40f8d5333007cfcd1c4ead392fb62cd74ce949061610c23eab38a5b65c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.