Security Vulnerabilities fixed in php RHSA-2022:7624

description-logoDescription

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876) Security Fix(es): php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

affected-products-logoAffected Applications

php