-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  php (SSA:2022-314-01)

New php packages are available for Slackware 15.0 and -current to
fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/php-7.4.33-i586-1_slack15.0.txz:  Upgraded.
  This update fixes bugs and security issues:
  GD: OOB read due to insufficient input validation in imageloadfont().
  Hash: buffer overflow in hash_update() on long parameter.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-31630
    https://www.cve.org/CVERecord?id=CVE-2022-37454
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated package for Slackware 15.0:

Updated package for Slackware x86_64 15.0:

Updated package for Slackware -current:

Updated package for Slackware x86_64 -current:


MD5 signatures:
+-------------+

Slackware 15.0 package:
cbc91a6200e5c3c78ab06fd678775221  php-7.4.33-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
dc8b00314308f4a35e17889517b34fa9  php-7.4.33-x86_64-1_slack15.0.txz

Slackware -current package:
03f81a2f8ccef9b39966ed8bdd043a16  n/php-7.4.33-i586-1.txz

Slackware x86_64 -current package:
0e3f72786920c2dc1e2240bd11427ede  n/php-7.4.33-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg php-7.4.33-i586-1_slack15.0.txz

Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-----+

Slackware: 2022-314-01: php Security Update

November 10, 2022
New php packages are available for Slackware 15.0 and -current to fix security issues

Summary

Here are the details from the Slackware 15.0 ChangeLog: patches/packages/php-7.4.33-i586-1_slack15.0.txz: Upgraded. This update fixes bugs and security issues: GD: OOB read due to insufficient input validation in imageloadfont(). Hash: buffer overflow in hash_update() on long parameter. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-31630 https://www.cve.org/CVERecord?id=CVE-2022-37454 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated package for Slackware 15.0:
Updated package for Slackware x86_64 15.0:
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:

MD5 Signatures

Slackware 15.0 package: cbc91a6200e5c3c78ab06fd678775221 php-7.4.33-i586-1_slack15.0.txz
Slackware x86_64 15.0 package: dc8b00314308f4a35e17889517b34fa9 php-7.4.33-x86_64-1_slack15.0.txz
Slackware -current package: 03f81a2f8ccef9b39966ed8bdd043a16 n/php-7.4.33-i586-1.txz
Slackware x86_64 -current package: 0e3f72786920c2dc1e2240bd11427ede n/php-7.4.33-x86_64-1.txz

Severity
[slackware-security] php (SSA:2022-314-01)
New php packages are available for Slackware 15.0 and -current to fix security issues.

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg php-7.4.33-i586-1_slack15.0.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start

Related News