Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-045-02
HistoryFeb 15, 2023 - 3:06 a.m.

[slackware-security] php

2023-02-1503:06:12
Slackware Linux Project
www.slackware.com
20

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

54.7%

New php packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/php-7.4.33-i586-3_slack15.0.txz: Rebuilt.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://vulners.com/cve/CVE-2023-0567
https://vulners.com/cve/CVE-2023-0568
https://vulners.com/cve/CVE-2023-0662
(* Security fix )
extra/php80/php80-8.0.28-i586-1_slack15.0.txz: Upgraded.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://vulners.com/cve/CVE-2023-0567
https://vulners.com/cve/CVE-2023-0568
https://vulners.com/cve/CVE-2023-0662
(
Security fix )
extra/php81/php81-8.1.16-i586-1_slack15.0.txz: Upgraded.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://vulners.com/cve/CVE-2023-0567
https://vulners.com/cve/CVE-2023-0568
https://vulners.com/cve/CVE-2023-0662
(
Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/php-7.4.33-i586-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/extra/php80/php80-8.0.28-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/extra/php81/php81-8.1.16-i586-1_slack15.0.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/php-7.4.33-x86_64-3_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/extra/php80/php80-8.0.28-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/extra/php81/php81-8.1.16-x86_64-1_slack15.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-7.4.33-i586-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/php80/php80-8.0.28-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/php81/php81-8.1.16-i586-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-7.4.33-x86_64-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/extra/php80/php80-8.0.28-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/extra/php81/php81-8.1.16-x86_64-1.txz

MD5 signatures:

Slackware 15.0 packages:
42f70860c20e4d8e7919632643b5d1e9 php-7.4.33-i586-3_slack15.0.txz
ca921cbd3e1913f168678b309478bb04 php80-8.0.28-i586-1_slack15.0.txz
3c315b9477355d47d90121e7f95309fa php81-8.1.16-i586-1_slack15.0.txz

Slackware x86_64 15.0 packages:
99e509806237a9f9ab01e023f384d622 php-7.4.33-x86_64-3_slack15.0.txz
32f5653c682942e82be61a113193fd9a php80-8.0.28-x86_64-1_slack15.0.txz
e0ef677a63dc35962226d828ae53ffbf php81-8.1.16-x86_64-1_slack15.0.txz

Slackware -current packages:
93196b6545a6699bd9ad6a59dd24298e n/php-7.4.33-i586-3.txz
9128ba44e5ad38c5898dd8445f415aa2 extra/php80/php80-8.0.28-i586-1.txz
23fd959729ed20f7a5ba4cb965217e66 extra/php81/php81-8.1.16-i586-1.txz

Slackware x86_64 -current packages:
7b59cd25c8065f8ddc713d883a8fbda2 n/php-7.4.33-x86_64-3.txz
edcb77db2ea1c340425241002ff5bd8f extra/php80/php80-8.0.28-x86_64-1.txz
0075cef00072f4fabee60241271e8213 extra/php81/php81-8.1.16-x86_64-1.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg php-7.4.33-i586-3_slack15.0.txz

Then, restart Apache httpd:
> /etc/rc.d/rc.httpd stop
> /etc/rc.d/rc.httpd start

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

54.7%