Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0848: Red Hat Security Advisory: php:8.0 security update

An update for the php:8.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-31628: A vulnerability was found in PHP due to an infinite loop within the phar uncompressor code when processing “quines” gzip files. This vulnerability allows a remote attacker to pass a specially crafted archive to the application, and consume all available system resources, causing a denial of service condition.
  • CVE-2022-31629: A vulnerability was found in PHP due to the way PHP handles HTTP variable names. It interferes with HTTP variable names that clash with ones that have a specific semantic meaning. This vulnerability allows network and same-site attackers to set a standard insecure cookie in the victim’s browser, which is treated as a __Host- or __Secure- cookie by PHP applications, posing a threat to data integrity.
  • CVE-2022-31630: An out-of-bounds read flaw was found in PHP due to insufficient input validation in the imageloadfont() function. This flaw allows a remote attacker to pass specially crafted data to the web application, trigger an out-of-bounds read error, and read the contents of memory on the system.
  • CVE-2022-31631: A flaw was found in PHP. This issue occurs due to an uncaught integer overflow in PDO::quote() of PDO_SQLite returning an improperly quoted string. With the implementation of sqlite3_snprintf(), it is possible to force the function to return a single apostrophe if the function is called on user-supplied input without any length restrictions in place.
  • CVE-2022-37454: A flaw was found in the Keccak XKCP SHA-3 reference implementation. The sponge function interface allows partial input data to be processed, and partial output to be produced. When at least one of these has a length of 4294967096 bytes or more, it can result in elimination of cryptographic properties, execution of arbitrary code, or a denial of service.
Red Hat Security Data
#sql#vulnerability#web#linux#red_hat#dos#apache#php#perl#ldap#buffer_overflow#ibm

Synopsis

Moderate: php:8.0 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the php:8.0 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (8.0). (BZ#2161666)

Security Fix(es):

  • XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
  • php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629)
  • php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
  • php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)
  • php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2133687 - CVE-2022-31629 php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
  • BZ - 2133688 - CVE-2022-31628 php: phar: infinite loop when decompressing quine gzip file
  • BZ - 2139280 - CVE-2022-31630 php: OOB read due to insufficient input validation in imageloadfont()
  • BZ - 2140200 - CVE-2022-37454 XKCP: buffer overflow in the SHA-3 reference implementation
  • BZ - 2158791 - CVE-2022-31631 php: PDO::quote() may return unquoted string due to an integer overflow

CVEs

  • CVE-2022-31628
  • CVE-2022-31629
  • CVE-2022-31630
  • CVE-2022-31631
  • CVE-2022-37454

Red Hat Enterprise Linux for x86_64 8

SRPM

libzip-1.7.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 130c2721c8857e3a843c117d88ba104e244ede96713e89ccf7f798564d60746a

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.src.rpm

SHA-256: 0bfa8df11884479b0cfb1e12b9dfdf31577e816d4ffac99a2be14794e7f626f0

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 57ee65eadf73ebbca87a1d7fd37985972d0e5bcc9a4b51315881279a930ed9fa

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 5ddba68be442aace8f2334d747089e28264288ea4621b321f27791e6ecf497e9

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 0a80e83b75001d744fd2cf99c6bc92c5a27afc03162735920356422f6952cfe9

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 7dc4905005c4057354c2c8bd1918c836384e31b308e0130f636c20cab512fb35

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 1c477fcc757f6041710c34c6bbf94186996e3ef0f02867dad81fd619b34a7dd9

x86_64

apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: d101f585108af2aa9c97fbb2e1414f180511c52e528c2858c6749686f86e1da1

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: a8c05d35bde82372c5d5b3524e5a072ad5c047ead9023aeed6ae06704976dd18

libzip-1.7.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 7d8f67c8c5cbcb488c4a2bd39f5ccade9ff845d830b7983a29f17d2d00c26ab2

libzip-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 4c44f6add1b8594549a1e9bd7e2dcad0f9edac14f8bee628662c7a34f75f8437

libzip-debugsource-1.7.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: fa18a8a34be2ff6e43a1df6099d370269e4dac2ff5e42ad3c2c7f6041f89dd7f

libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 0d2ec09bcf6f54dc4846c8a4b8fd54db69b3465af0662ebf938b0b52531e1ca4

libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 2c334b4724faea1512d96d8779b7b712190969b4c56c45fb0915b97b8761c533

libzip-tools-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: d233f4c643442343c26ede85741ebdf4799ddcb6dcdab0228ca7e248f3774494

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 11ccb61c26ab914e643f49b977e1f6245bc02fa4dc4da9de243f0db6aba008b2

php-bcmath-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: e3812a4a791bdc2fa2f0a0d478b7b28f54490a133c688437623e7a33742e3078

php-bcmath-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 3900de39efba67345726bed766b7a3ad018000ec1e1ccc5b40aa197e4d229422

php-cli-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 2106a277ab7f372467f81d955f41a7cba36af169ca093ad99a6c9ad4920df3fc

php-cli-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: ea8c068060d88c9255e0af83ef8ec5a86e1bf68e4cc51e00ac56388a5a12be05

php-common-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 646dd85130962b1cb473e1179e1500e471e3499fc527935ea1acab7c715d9480

php-common-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: f4b0985f631b793641ca1125bcf0997fdccacb8811faea38f804b301a685f5b9

php-dba-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 1560c64b3d0da59e829a1ff03831427897c606e3876123cc5bed451842a11653

php-dba-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 525638e4ef3e9d386b3051bd4561c576474d13f6a3648f798ac27a728a245817

php-dbg-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 0ccda6681c0adbea1dc3bd25d66c8181ad44f4b5b87686c51b42363919a9bbfa

php-dbg-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: b13ff549a5828dcaf5269024aa1956f3e1b91b119c8e55a3863ac9f82db90da1

php-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 3465b82d2c762a5ecce3ccab6dcc101d722550df337d3537ae579c23bd114509

php-debugsource-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 62f7c7da88fcc4a6522c0f8228830a4a98fabd35a51994b3a47ca825835e8884

php-devel-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 6d14f3b182796c9d0e6c780c14cd7e19101f4ddb2fad5719178b15eadc85fe95

php-embedded-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: f715573052ab3db5492efb0226aeb5325fc81434e910d8db32469eaa3569100d

php-embedded-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 908e0509783eda00e949f1a77f4676eb39bf3502c33c260127d072264d583bae

php-enchant-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 7aaa8e6b2183f040b2442eb0f37f38d095802b9fd30aaa1c3d742f3e813db4f9

php-enchant-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 67f5a7a0cdd85724ba6659aded14c71936ad05a2c73410abdef6109d342e89ee

php-ffi-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 506aa5453c78670f42ece0c192ccc5ad24b620e43cdcefa8d76386b59107da9d

php-ffi-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 9d41bfb2af9c84ff8192fe01d080f5290e0110d0d0ef3726ff0beaabdc93c1a1

php-fpm-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 3c92a8df2ffe566317364322f86b0b85d36e8aae526d951cd926fece6d0fb744

php-fpm-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 2cec15a386f714cb78d697ab9e357c608f09d3f708ee98b2742436dd4a053183

php-gd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 765eb57703bed94f37325f039b9700b58961082438b529f926021b2eb1216897

php-gd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: f34941b53f9e5d95ea5e19e038773d9da06b590c030b83e0139302f07503c121

php-gmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 5ff84ca98d9dfa7e1b7f4e918f57908fad351518541d4dbcfc3b5dca0cbcef0d

php-gmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: fe7ce70239acae3ac32513560ecf5c7fc328ed5b8b0729055392da0ccd716b28

php-intl-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 629427fb5717a4c2e62d23b64355b0e4af6fbfd97c06868677c62cb4cf1a230a

php-intl-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: cb068b6081e7d8c6a6fa9b22cd7b73d662d1a4cec4b7af3977af77473d6d6de1

php-ldap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 9ded8b5e490de3def2314a3e10cd3165d348a4a8c763f164c8f0cab36049df20

php-ldap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 7f856fa000e6da84cde1bb0afb7d377d3234f5c63567f68cfb55572fc2fcb5c3

php-mbstring-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 73cfaddf763cba8a4a16a91b8b7b6a36574d1593e8f870d09bd3645a30e9e010

php-mbstring-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 1cd541a369d49f6a877ead53005e1bc78e801dddf8ebdf746037114ccaf0681d

php-mysqlnd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 52771c13099d700f936b3f7c9d8f54be5c726b92964faa40ac3fbf754075bdce

php-mysqlnd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 5d201f6d4645337dedde0a2ee9f12cba1de7c7973a2c78e1a98c73702cd084f0

php-odbc-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 71fa2b85b495416314450ffa8781841723d1f39a4d0a3f9144a423527930a97a

php-odbc-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 88246f0fa9dc7c192b59627e590fb0108699b605d11b892a7dc6416a982ae7d1

php-opcache-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 1f804e5157e624220778f1842b96b6051fa2755b4273bb532d0f6fd5bfc8db3c

php-opcache-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 033bf65c214ac8b9aaa7492d22f574e1bc17acd233d91342d80a862f310c00fd

php-pdo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 3ca3c8515b184ac01cc1db537b163766fa8029f7a4f686c1ea50b97beca0db2a

php-pdo-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: ed686dc675e65127f39e7ffc09fb7774d7a2b8f01f33462956204feca4aa0f1e

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 098b98edf6bcadf980dd5b44434987174b23025762d4aff14164eacdc7e4ab09

php-pecl-apcu-debuginfo-5.1.20-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 5b61e20545f0c3e5a0657ca789d83568457cfb25083230588dbc7384d9096434

php-pecl-apcu-debugsource-5.1.20-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 376f762999a3dad7948cf022ec04c39f2145f60367ae260b9bb1a1fd13c8c4bf

php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 03cc51194ec55c3360365220d9ebb91d3fd1ff5695d8bde5db02d5f897e9de40

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 1cef0c9ff3ec9ddd66f458fd074f78ceb1c1b02bc37c62d04873c616d531e857

php-pecl-rrd-debuginfo-2.0.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 595dcaa0a08f904fe85e900b437bdb2a7071cbd1d519b20c10acf242b9cc8a81

php-pecl-rrd-debugsource-2.0.3-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: f0b5f51622631efe1b298ca3469e483a4864a513ba6a1c17f3c5fdd0343fb26b

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 40e4793f5e0fb6d725953d51c9d0a5bbdef608a74672df8c08d01e9ccf32b989

php-pecl-xdebug3-debuginfo-3.1.2-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 86f6d21242013328713f6d4266d23d1d888d0428e30fd34cc12446cce018f9c9

php-pecl-xdebug3-debugsource-3.1.2-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 6b0c15c320f162ad4d26e86e9730fbfadb1cda2a13a079b70827065c3b40e53a

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 07e694ba8ed7cd81f7a41a47fa9c79c9253db786bbb754196a8d60b9ecf5b953

php-pecl-zip-debuginfo-1.19.2-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: 908a4828e4ec77085e2fe8ecbb6b2afaf98543137e77eb13bf9a08b93641b714

php-pecl-zip-debugsource-1.19.2-1.module+el8.6.0+13671+84712317.x86_64.rpm

SHA-256: b316c24435230301da69ef98f6b69ca1d36c1fc2e105947e7237ee289ed886f4

php-pgsql-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 99485bbeb4f3f0b8e5608ea2382848e24fabefc6dbfa8ab0539404e187eeb220

php-pgsql-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 8f0b9b158a193f2eea2e405ea51e41a617185f1b362bc4799fcebc59c63897d2

php-process-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 1782c132cab47d467f766cee7088127773a2326e611d856d93344aadc5212c01

php-process-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: d4f54807e19ef16ee9cdd977b98c39687d08db94398e95798dfb3980b37e1b6a

php-snmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 07ee2f2eb51d7cac8a081e6415b3e253fca030121f593937d850525095612ed5

php-snmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: f2e672f3d7b682daede1d68c972c7707e45e9a7528b30871c82bde808ec88588

php-soap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 8d79f4d526bfcf0faa14d80619456174fab0fd5d374c50bf442e2ba9f3aded9f

php-soap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 2e1f404d25b12e8c857caa8b038d9783bc65ad6c6054b7f6e85314c6126c49fe

php-xml-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: 02e99198b344339a8639c14241c9668fa867f5ed219d5fdef0e102d99a8c6e16

php-xml-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.x86_64.rpm

SHA-256: c75ea226de2cd6eefdd90afb45dfc23ffd393b0b2c815c0af0423f55cd8a7a4c

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

libzip-1.7.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 130c2721c8857e3a843c117d88ba104e244ede96713e89ccf7f798564d60746a

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.src.rpm

SHA-256: 0bfa8df11884479b0cfb1e12b9dfdf31577e816d4ffac99a2be14794e7f626f0

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 57ee65eadf73ebbca87a1d7fd37985972d0e5bcc9a4b51315881279a930ed9fa

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 5ddba68be442aace8f2334d747089e28264288ea4621b321f27791e6ecf497e9

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 0a80e83b75001d744fd2cf99c6bc92c5a27afc03162735920356422f6952cfe9

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 7dc4905005c4057354c2c8bd1918c836384e31b308e0130f636c20cab512fb35

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 1c477fcc757f6041710c34c6bbf94186996e3ef0f02867dad81fd619b34a7dd9

s390x

apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: d101f585108af2aa9c97fbb2e1414f180511c52e528c2858c6749686f86e1da1

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: a8c05d35bde82372c5d5b3524e5a072ad5c047ead9023aeed6ae06704976dd18

libzip-1.7.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: a569e8a0917f3e8a4e6070f73a72f3d984f894400374c281253e4c636b1edecd

libzip-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 90c6db02d071c4a46852f5de2bc38de89c3abf25dbe57293b0bbf31b7bf1e812

libzip-debugsource-1.7.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 530c7305120a944ffe6f0346cec23075bdb1366ec7906e2eb8c6222277742cfe

libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 0f1c479ab35887fb1ddb4d9761c24c7a89b816871b506d5380e747161290422c

libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: f94881dd4a833b8c885638349ac4d10cd76d743c75969170645a405d6de25b66

libzip-tools-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: f07520511e8de0439c57a7f85c2cf8c7814b55558205d77337804ab31b357254

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 0a983eca24f98b3db1e7dfd84ba768063ef4b212be008a47418310e886ac90f5

php-bcmath-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 5261fd28bcc34584f9eec8b8381b096207e40012076e9e12a00945295f88f71d

php-bcmath-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 63fc2032b4a63f749dfca31d358932f26e5a65d0b741c52e62c2353a2706c2e7

php-cli-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 5416c988cb8f980800cacb28b5fa8e7cfbbd25fb851ce6ce2d92daca62d42503

php-cli-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 7d33d569a6237b90abac0d88006ef8d9ddae60b186e95f243c116dcf2e313056

php-common-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: ba68f9674a25de7cfc38eb06e239b1eeee43418e433af134dc27bc51954cc323

php-common-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: d0547b0d549db3f8211494dc0ab656925cb0311acccb1ab316e119deb19fe464

php-dba-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 4dcb1d7bb3ca5a3a28ffbe3a1f9ada6c0d15159fcbaaaee77416201415956891

php-dba-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 4196fff8bc2b4e8eab11392184870a694a6e5cc69f686d59cfdb1c9a47e5806b

php-dbg-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 707a19d7e7438e24611ceaa496a7b4d1baad6ca2744f671dc74403e1906998e2

php-dbg-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: c5b2291f28338a0c9b75cd008f95ac6b74560e908fdeb78290fd31bfb2c24195

php-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 36838dd3c0124b50ad6e6ee49cd6bf3ebad1d02f20e8628ce8abf46b58f1059e

php-debugsource-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 213457728fd8e6a4dc076459462d6287fce16168cd1d1a2877b775e42c948ba2

php-devel-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: a6c9eabcd6937e5d10aa990bb3879b1384774ad8d5d121017fbe63996a13f9cd

php-embedded-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 3954b9ed2bad3a7871fa8bef6dd71ee67ff49864c8a43640f7c4144bf8b25512

php-embedded-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: a08da3a7513bf0187adcc5ba934f95810cec4f580911f8cc883e2a70fafa2e11

php-enchant-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: bb369fcf8f450d8d9eb50487b90b66eb8b09efdb1a052ef3d413be449a8af9b0

php-enchant-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: dfb30c4b2ecd0469245d8e6d3412bdb62d3d15cfa328296f0a93d9794a2e3ff1

php-ffi-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 6a4afa1768f0f1fd54fe5dfcf55585d19164e9abc988a07a5e054675f000db24

php-ffi-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 24b15c5ad7db6302f1afd1709654c978fce3fde748065b9783013cb3eeba527f

php-fpm-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 54e190fbd0652e9cda41472017d31edb0abd85b146a09311001a9f9e857435e8

php-fpm-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 1448ac3dca448209101d869c603ca39c7e45f74945f288e230e75e3b8db62fcb

php-gd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: cd02c493ef89787bb0a3bb4f962b0c0a046fc2ec03b9e72a7a5b6ea85d414db9

php-gd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 57a2fa06386c288a6343c10ce74d279287a6177590a542e8527549897494b50e

php-gmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 44750ac3f40a5612ff37503e3a8ccb896e6d5b15d8ad94ef7ba16595bf3431f5

php-gmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: f286e48c1fe645da0d7b720ba77a76b1e570bfde2361a57d8961f66e545935e5

php-intl-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: ad960f5865802ad6adb1979f6f899596e1ff639b949a7f6593f8ff01024a0bff

php-intl-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 8af352cbb18bb3c760e4191abf4d4d83405b760062afff63424c3f08a3b51f78

php-ldap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 9d5d8082bf3260daf5d1b0f073f1d85ab5769ed5b7fb5c3b27b0122d94959749

php-ldap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: ef94f4cb5a1dbbdf58a1a9f1fe6d7f2d7bdb1c7b56fe0d7cd995cdececa465f8

php-mbstring-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 1f17a94a38ff0df490830b50a1fd178c101229cc6d27af14cd4b1e7195ac8b82

php-mbstring-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 2afaf65218589d7ebd213f87416edccbf99e8a6a3beedcc38c770edd35fb84ed

php-mysqlnd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: d6e60609e05789c06c84ced566b4acd5d5d3a2f914e9a9c0e0111c0a33c5e04d

php-mysqlnd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: bd7287fc816d388bc2a3cbe1eaea8d0c1db5256843f4406dbdc7aa29cd74eacc

php-odbc-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 7524ef0d5627a86f53ccd2e5189c4e399e0f1611398b53bec5d859acc0fcd53f

php-odbc-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: b89024af4d12fafdddb7782caa2ae845984d407c7398798cee1abff11b8941dc

php-opcache-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 81e507fb61d97ae714073f58dbf99ce3f54af1dfc488b8a9ea5a946827d9784d

php-opcache-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 628c6f8fb0f6ccaa513f4d69fbe2eda0fcbe19f4e81f3098f72a177720a10c7f

php-pdo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: c489ca86f5e8f03bc4bbc0517e2d873a67cb6f88f56f9c997b74e7fa459d4f26

php-pdo-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 356c803ea2bfa5f0019d02c642acbba04435937d99638c59de97c688df18ed29

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 220d0bac3f1adcebec1203123f236c79d6acb608e16aed94d3e86f09817b6904

php-pecl-apcu-debuginfo-5.1.20-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 2d234734dbbe86ce883983e489e3fdb0d7a8e1744240b4335fc68b5b73b67141

php-pecl-apcu-debugsource-5.1.20-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 027931527f6b3c232f035f94761c8cd1e55cf4d47e972982944d1a2df1a96369

php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: fb47c45536e40c01239a781dc0c1af80413cfc19528a200814cf5eaaf33b5730

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: e3dccb58dbb82f34253cad5b212eb3364c334253a24cb6f0efdd0df3e4f14876

php-pecl-rrd-debuginfo-2.0.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: f81b22d080eb4169bbee0eed9214d47aa6975a6a24a47e98e7ee40b881efa28c

php-pecl-rrd-debugsource-2.0.3-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 0f7d529ee45f4e27e4aa923f31b3834f3ef23c0d4bce5f39c95eb8b31cb28cda

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 80e65e24eef9e6bf5dc6ecd0b1f0c2cf94c60a93f184270051c93cc2bf2563a5

php-pecl-xdebug3-debuginfo-3.1.2-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: db154367f4153d93717b951f26c02e6331254d89f825e4608cb0ac37409fc1dd

php-pecl-xdebug3-debugsource-3.1.2-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 9183116c130480c907f6420304de580b61400138c59bbddc3347888ced3c3890

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 16eba8cbb3a4ec728fd0f062f6eb4ebcca1507266e52992ff379b6c2f824de78

php-pecl-zip-debuginfo-1.19.2-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: abe522d248c9de0c459a1069d70d1c8c734dc443032f7bac763a36ad9999d771

php-pecl-zip-debugsource-1.19.2-1.module+el8.6.0+13671+84712317.s390x.rpm

SHA-256: 401adab51a60192de3097b73b68b93152935152ea9ef2bd24f79ab5d071b92bf

php-pgsql-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: bc400dc18c6375a97815b30d80ce8adec1ad533abec1d5d2e0b785ca997a720f

php-pgsql-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 30edcdb83ecc6b05b8b63a9710758ed3f228071a6d1cb63607c5815080f7c1aa

php-process-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 4eb15fb793770aee105e4883260421dab2275c0b263ded4ceb4c13bc5b1d9d3a

php-process-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 832101d472403cd181c8e34c7ee77161798e0dd96160c3120cbbca7d7ddf13ff

php-snmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: f1cfb9d6dcdcc91893ba7548b43bd1ecbfe244eaf4fcc013258f1d9f371c8cda

php-snmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 40dca91552d58a52b1fcf6f0c5548aadf71127e98185ba0d37739e07713d2f1d

php-soap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: a22cc37be9f691de4114436f36c44ac74a0f7565af37bb6b3e2f030f76c9ef30

php-soap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 909171fd903d1ec4fd628cc791eebd7d2fc0e7dfd6a29d604323e69623f199fe

php-xml-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 4f4ae5c866e3b9c8dac28bbce51dc4c202a21a775c9f05d3f0542cbd15064845

php-xml-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.s390x.rpm

SHA-256: 22baaec9570b08c9fbfaa39d3deacc6dd108b57f2cc1f60adcc25c2254749262

Red Hat Enterprise Linux for Power, little endian 8

SRPM

libzip-1.7.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 130c2721c8857e3a843c117d88ba104e244ede96713e89ccf7f798564d60746a

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.src.rpm

SHA-256: 0bfa8df11884479b0cfb1e12b9dfdf31577e816d4ffac99a2be14794e7f626f0

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 57ee65eadf73ebbca87a1d7fd37985972d0e5bcc9a4b51315881279a930ed9fa

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 5ddba68be442aace8f2334d747089e28264288ea4621b321f27791e6ecf497e9

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 0a80e83b75001d744fd2cf99c6bc92c5a27afc03162735920356422f6952cfe9

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 7dc4905005c4057354c2c8bd1918c836384e31b308e0130f636c20cab512fb35

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 1c477fcc757f6041710c34c6bbf94186996e3ef0f02867dad81fd619b34a7dd9

ppc64le

apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: d101f585108af2aa9c97fbb2e1414f180511c52e528c2858c6749686f86e1da1

libzip-1.7.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 15dd04a1f911b1cc1a24d8d756df9b1010d17f35b5cb0a3ccd0ddd275a405858

libzip-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: f8f5305b47a3e6d0a82622a34a88fdf07f6d9100242da552c2873a9568fb6bae

libzip-debugsource-1.7.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 48fc1e34444c6872525909ca758fca608585fd657c6b3c0648a4a7b10e436b53

libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 27d4314bc3eb0f9c4fcfbd9550d8c8a4b5d0ef4ea046c21fbd9d266af3615f99

libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 17890d82776aeeb935b017c1e08008c5e2b65bf294ca1bdd0aa945eaf3419892

libzip-tools-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 88fc4bd70dc87a25a038c670bc006b19f54a31d1bbc0de87260645ef107570b4

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: b18e727aef4e105f68d62ab2e10422fd1587dd391ddd4d55a8ac1541a59a61b0

php-bcmath-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: ab49474253c997dbe52904ea92fbb0536c6156b30579db89c9641c1a7c5f33ee

php-bcmath-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 4603248bec72141fb812de65626f32a3f58ad9453a21d17deaad0fb1cbba0199

php-cli-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: a2f3012ccefe6cdb7add4288c6bb626d64615dbafa8e4ad2bb209089dfa90ed5

php-cli-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 970a1f3cf12da31da4a1df685f821a8a04fd9b466a5b45a707b8908a4b939875

php-common-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 26a5b04a8e1e9e76917f1762c9d51739b51e22a47f4e302b945a405b02384fe2

php-common-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 132d37c9461972fd10d2a01ea0895f2ee159af8faa355a1276444a464adfb076

php-dba-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 640134add1f9291da2bdd940344143a8df03468a46fb394f5e7231ceca0bbccb

php-dba-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 67f9103cb3e95915626c9e3b95539218a34dc309e50251f7b5f7f21baa8235b4

php-dbg-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 7598f5c1971e626cae6dcf871822dd48fcd952a17a39be0870b212ac978f020b

php-dbg-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 93318b383d5c0bf91e815f35da376f671063dde8449828b5ac6dba30a7806428

php-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: a6a12eb54eaacbf9b15c19299ff7a6ea475668d03836e6dd6f4cd0e7c173325e

php-debugsource-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 1b0df0b1a87333c7ee12a1a4b9047575bfff1aa3e08baa27be93bda9a4e65e50

php-devel-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 8a29084e5d1ff22b1c3b3ba6685e7b26bccc1b3e30db3492dfb8a48877ff1cf0

php-embedded-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 4ebea8b12026a9ed07f53559979b9395dd64fed4f3ee13e4c9c73809b3b44f0f

php-embedded-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: a816c58625fd279ea6a06deef5c3d8de1d763cec0970f0271809f82ad8b8bf8d

php-enchant-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 7336d13a6d21402b57e26197ef4da89bcbe197ce04b5ee2189564957c606c5cf

php-enchant-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 744758d54b9b65704bcf60dd6bbd713e45b867dd021a35bcc9181d1f328d1582

php-ffi-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 5ba04d545810065da36cb0e50db86dac776d99ec6527a88dd5c65cc250bce65e

php-ffi-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 5c8fd3e10d79e05b42560c2b5295e4df36134212338b4287b3626771a7c4317b

php-fpm-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: f9adb81e148c5acfe5e0749f159432e934679259d6f10c44620798652b0f8a44

php-fpm-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 7b677d545621574d63212f37307795e174d57fedab67d919ee11305b41afea3b

php-gd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: a59d6ef03695e11b5390258fb266726e6214842881cd228400a471a30472e972

php-gd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 0380ac7a8ed0a80579743099c56f75bbfdd85b561512d5c10e39b52502f14c9a

php-gmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 5466f1c459af4ef49fc138a6a427d3c0579f398164eda85c78f38bf681d9b499

php-gmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 506dfe61bec7fde312b9de55be0c33e2ff8b5e8a9aeb6db6df40eda5a7b1f11b

php-intl-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 34ec07e2168b4078966668290fd3a5d02aed15b446e51942aafcf831dba9ab8c

php-intl-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 3314d9a99a247a2a5f141adb14f8463e516922ab83b8a8172e682889736e7f66

php-ldap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 71249e6b6ee38758046756f29bc7bfb318782c4d39b8d60553fd82ecedf2a87f

php-ldap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: ee64a21a28fef99b907084490f09b8873fb28c189d46701dea8b879a7469c36f

php-mbstring-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: af0b12c7edd504632d0f369e779bc843cf6e80936676cf9594db6886b6e70b59

php-mbstring-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: cfa5d63940ee62bb058bc7f2b1c92932db44c058a06703dc279dccf9905fee9a

php-mysqlnd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: e328822c74985c62f8de6fe8d58930054d6852c3499469eba7d495b32eb1af20

php-mysqlnd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: da1f55344946879049a4743bca4781251666bc245801e6b1760b56391ce83888

php-odbc-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 2e58d6b86cded94cc577155d98fcdd5016787c0c5094cd7c591b6eed3716f660

php-odbc-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 1efd43a2fbb453cdb107ce46b589593381161ce87751cc12d082be5491018930

php-opcache-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 4b4cc4118e38d796496faaa96d6b3e8445c20486d5a8bb7e3001353942aba1b8

php-opcache-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 461aa06322baca60dd18aa4e417d4b2cf8616118e3003b3dd7252078b08b0f26

php-pdo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: fb1eb9405ecada9d7e374b665a20950014992e548cc76697b1ae9c94e4074f37

php-pdo-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: c7ff0caaad690de3ee84c7bf593c67aa823229290676e153ca58ee6919e9ca1d

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: a8c05d35bde82372c5d5b3524e5a072ad5c047ead9023aeed6ae06704976dd18

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: aa79f1fd888d60fe88c581239b3334a8e0bffc556b125a102fc04c5fc8d5e3ca

php-pecl-apcu-debuginfo-5.1.20-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 17bbfe4a854a44f0f50bdb6eceb99b65470796523534376819893a729bc3f2e7

php-pecl-apcu-debugsource-5.1.20-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 4e855c4aadd3d923dc1ea4bd4f84a79c0ead55d4a0886bb636a0b03e0913c0bb

php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 13339c5d462e1424aae3ab1bebd2601adacc6c5a82cfe9ed80a2b0033b7fef3c

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 5894c3893a2fcb01b7429eda458f57a498281ff7a8de8b4ccf33e3b5d4a21d48

php-pecl-rrd-debuginfo-2.0.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 8f6e907fab4d6e10cf1fbe3009929bc1deec70442e129455896cad9b78e86e4c

php-pecl-rrd-debugsource-2.0.3-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 1c3182af38e8f5d677c29ea5dae83ad35cd31b8926217da20b55a4b4bdf37874

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 95e2bdff4996b22ccd5e6d89b93b2b0c380954a030d218b2aa08da9042f10520

php-pecl-xdebug3-debuginfo-3.1.2-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 79c6ead1975de7b2c86d26be71705cd0471382af90a8d07bddcf459dbfd9cba7

php-pecl-xdebug3-debugsource-3.1.2-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 42ec8b5b3a476e22c6659400180f1f9b558c41434901da4180e4bfc28dbe940f

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: e9d28c977e60f7b928f8806efde49d5ac984c209f9da743602b52ac2b141639e

php-pecl-zip-debuginfo-1.19.2-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 131fd2e6f95820d68be068f2753d658798b89097c2cb46b3081459311e334c85

php-pecl-zip-debugsource-1.19.2-1.module+el8.6.0+13671+84712317.ppc64le.rpm

SHA-256: 81b1ca7ae92144cc9069ece73b682e2aad037137aa4ed70aa06d22b1cf68a5bb

php-pgsql-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: c70921fbec5adde2cf40d66d2926d7b62568e507d9752f5fd27d8c57aede329d

php-pgsql-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 7388ef29a389e53517c6ae30f7672186d7bb2e0bfd1e78d169bb60e6dee465d1

php-process-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 72fb23302536bbdb2d9bbc5a35ede41adaa816b240d76c508cedd5f1be5b5a95

php-process-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 0eaf2f956d78feba35ba369af6dbff4aba9272e8a44b12ac68e729da39a201f1

php-snmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 6165ec4321bdb4b9961cedccce548a1914ef0709106a683ef96de0621ec58eea

php-snmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 02c7b2bb6c30bfb8a0ce1873d1f336d1654214151a9b9eca995f49fd22874602

php-soap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: dc888edb9d46570a628b567cfec9fc66836be997fb796ec56e23f08759d1b1d5

php-soap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 0d40d78ab3ec4aad73e8703bf39479e35b61bd4d45e25ac2af6453e737368d9a

php-xml-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: c69ad413a6668b5e135fc94fd4234561d3e48fc90fa37d9e7e4da20802c8c116

php-xml-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.ppc64le.rpm

SHA-256: 065071a41a78fcf9af0a802042fc08acab5651b2fd536c427169cb0a3c873497

Red Hat Enterprise Linux for ARM 64 8

SRPM

libzip-1.7.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 130c2721c8857e3a843c117d88ba104e244ede96713e89ccf7f798564d60746a

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.src.rpm

SHA-256: 0bfa8df11884479b0cfb1e12b9dfdf31577e816d4ffac99a2be14794e7f626f0

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 57ee65eadf73ebbca87a1d7fd37985972d0e5bcc9a4b51315881279a930ed9fa

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 5ddba68be442aace8f2334d747089e28264288ea4621b321f27791e6ecf497e9

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 0a80e83b75001d744fd2cf99c6bc92c5a27afc03162735920356422f6952cfe9

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 7dc4905005c4057354c2c8bd1918c836384e31b308e0130f636c20cab512fb35

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.src.rpm

SHA-256: 1c477fcc757f6041710c34c6bbf94186996e3ef0f02867dad81fd619b34a7dd9

aarch64

apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: d101f585108af2aa9c97fbb2e1414f180511c52e528c2858c6749686f86e1da1

php-pear-1.10.13-1.module+el8.6.0+13671+84712317.noarch.rpm

SHA-256: a8c05d35bde82372c5d5b3524e5a072ad5c047ead9023aeed6ae06704976dd18

libzip-1.7.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 0ccc0d06c440841409da6e76c8adaa3d01d56456b96af0b2c4a93309500925c5

libzip-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 125b3885f57eb830d840eb155dc1a371f93c1a912cfdf8d168cd7aff10e78f60

libzip-debugsource-1.7.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: a1cfb86d24aae3254db901e8e3b2e2d74f0d1eb7b0c6dd125fca580199579b2e

libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 8e296b804662b9a1db903f0b1dc91bf7b465ebf100ec238d0fe100d4310bf023

libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 212a9c1d8e4f41b65400a5252abd7560d95d50eb39875b0cb9e188ffc0afce1e

libzip-tools-debuginfo-1.7.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 22e610cc8e1814164119e0d4c40544d5a1fc4e580e234443da40d215120e4edc

php-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: d3700f5d0b1ec7216c2f13a840c65cc378632372dcb1e38277eba23d20431001

php-bcmath-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 7b97defa3f3c847903b7f2a0b78f2c665885198959858baeb4639d71d427ff34

php-bcmath-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 04b0f61172f9cc56a1c435be9ba84ebd543689b13e7be0c86669feef4333cc9d

php-cli-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: f49aabd20b6154fdfee286b371f9e75de329de77888870443b8fd89523380239

php-cli-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 5f0a392a542c54dd2aa92ebc7d139cd577f6230745eea3ddb24c8a3d79a9a181

php-common-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 2f66b0bf656e02389b829214cb4f8356afade8f42c5b7e3273101763ae79a014

php-common-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: a48924cb890a9faf2b1798e8d104d1359874bcbc88a2418a263d7b2bffb6b6a7

php-dba-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 25f74a02857e9ca3987212d705d01af845ad878d89bdfb537a90a23acb68a125

php-dba-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 6c20336ed9f9c5191630515bd7bfcb6f9a4d44676c8b5f5ea1778d99d1e49cd7

php-dbg-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 66a1d34bbaee83339e44ba139961d4c9357f712163a9d3c5f9d599b7715dfc7c

php-dbg-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 1e10e1ab33ea373c65353003e87880af4811a0a5c509a7d98f96393be7eadc95

php-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: b6c802a0992c6cee48faa5c197f87c8fbd73822e98c0b8301b1070dcc6db655b

php-debugsource-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: d773166add67fc5812b4fcfd4ad7c87a534aa8e5b623050d37996038fb48c0c1

php-devel-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: a665e88b6538b79adec53b43ee63db22461ff9d7db9bdfd3398422ae708ade39

php-embedded-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 6eb4a5e6f0e6501ae676fb2107c234b6d584b14e0253f7c8bb9cf80cb1ed81c3

php-embedded-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: cea2c71ca3efd7f38956cd850d6c6eefa058e14e429bc44bf67c0cc6d0e1bb7a

php-enchant-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 8fc9bdec6d6c1c7d05162e9e49c9bf34243970f14bc0a9fea9af5ba87df86b3a

php-enchant-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: b52100392f8be4e541989dd18c391f8f03a77af87596ade0e0d7d76062b2fcc5

php-ffi-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 72ed54a7728f56807283156210d16858d4ddd065e539cb64e4b15ec8dc4835f1

php-ffi-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 233c6ef15f53ee26f5884d93a94dc8b4773cf3f3fa79939d9ca2b716fccbab65

php-fpm-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: aec8d0a097e2475c8fbb47a11e5ac56ef1e22a20f65423c863d631e49e84ff9e

php-fpm-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 06c75a9e2537a4bf59121bd2b713b516423d39835b0e8e704a74a4167c4eda12

php-gd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 91affb3bfb439578e92114ee7ab5a2c56df99192ae76104471c03ced1162391f

php-gd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 4fd5ceeb22f816b2ba76795b02e46f7d0eb757011fa971bd9d60e510335e0f2d

php-gmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 590d399e66191f5b9195420188b5f48fe10326ca4b98232d5549101fec462da1

php-gmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 77fa32bf4288f1a9e124a5da1cbc785f7a1b90ae0bfc9ae895d365e78842eaf2

php-intl-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 2b8fcbbcd159115e206bee4408b3e26081fdc85d0169f1eaaf258a5ef2cf1b69

php-intl-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: e3d53e89ddffbd11fee2e7575c2db57c1c0c999da62651a6da7198a196e782f9

php-ldap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 6e465f9ea80d9a0c17bcb3f319c8e4a119d1a82b3d6f6a9e7208845dfa3a3f8a

php-ldap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 5da68cd07c637770ddc96e861614422696089e817dbcb2b2977a4c64da19fdab

php-mbstring-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 23185923038b0eb404112f9099e5e2b17e7e6f498ba22ec9908c09b917cf4e82

php-mbstring-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: d0e6f8ccfd9daaafed86bb4b53125efea3de57a52d004b2823ada9c1c255ee72

php-mysqlnd-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: ddec5bcd1e6943af048b7943d82659621a4b609c449632b54330ebae2a3b05bb

php-mysqlnd-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 5a474f8a2a76cd22e0afba2a47ef8d6500c91c6ecd91c7f6e2c99cad8895098f

php-odbc-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 0b04601b5e72aaf26cafe1643d9c203cb560839f29d7293124aff4ec2f58d0c1

php-odbc-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: dcf526d78760837e41e81f5b7925624d8fd5bd75993ada4a9efc27a35058d74e

php-opcache-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 8b877f28f274a4aac49489232dfce5bfd6753cbd1ca66b08722b64279f04f84c

php-opcache-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 217bfb826f0e3ed6d40ef7cba3e666755795ba1f94b9bc302b748b47b6546fbf

php-pdo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 8e50d9bb5722ec1370dccfd2d51a08acbbd9f112ed4d99f90e06ad67310a1410

php-pdo-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: f9f7118c2316dd47d79bf44c703086d38da01e768105bbf460f221a6a0b02b98

php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: c0949c09db14fd8e008ed41d505ee87032991be36de875c2542204743f289938

php-pecl-apcu-debuginfo-5.1.20-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 4b12188aece2d3cfd7b4db3dda935ba30acd5b781d32b76a541dbcf7db63ef13

php-pecl-apcu-debugsource-5.1.20-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 75796afc21c98e60e072ad2e45f2460c52119ce9ec1f7034e504f730708e7e17

php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 882a94fc12b85072699fc7e80f4b084aebb2079bffedacf4f57103699a9f3122

php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 43c34401dca1a61ea1d775c061c447a6a8e7fe55827dc69fe3e724c5687d1072

php-pecl-rrd-debuginfo-2.0.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 02520ead7e43eca21365471330ed259a4075ca17b4dfa8b28828563738253a4d

php-pecl-rrd-debugsource-2.0.3-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 588b54c9220a34ef8a2bec326f2e7d197641006b6071009e207bf878878a3c79

php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 22890353b1702249be311be34b538aa0edf803846dad3eb545ff0ba279b578c7

php-pecl-xdebug3-debuginfo-3.1.2-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 9676d070677f2b80dba302ff612cf02d20a91ef1f2039d37b983929a1adfac67

php-pecl-xdebug3-debugsource-3.1.2-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 347b505e382ff38c9b5556afe166d2154e0fefc886f2d294122d87ec62a2d8ed

php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 892b1cd9bdf738a9d0d323127650217a5998bc3ca29ffb9ef0fcef3003530dca

php-pecl-zip-debuginfo-1.19.2-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: f661980897aea3204118bf02b43131eee7be32c1b23f42e43ded4db23b82a99d

php-pecl-zip-debugsource-1.19.2-1.module+el8.6.0+13671+84712317.aarch64.rpm

SHA-256: 9757e1265864594929ff0c5299618af1a4d91506cfb2fc14be5b45860aad0eb4

php-pgsql-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: db9737c4827c93b42fa324318c0837ddfaf0768bcb6801266f1bcde8700cc8dd

php-pgsql-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 842171f2656c64adebd80d442ef8c1c263ee7f54f6b99d111042842f7bceebf5

php-process-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: e4fafc46d5411028f77ddfefdf2f40171edfb79277e8a3e08103243029b8bb7f

php-process-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 4c5a53898d53090d027f3d8d1efabda7ad000b02106db15179de21522acbcabc

php-snmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 7ea89e6ea64ecb0077ba9de6f82bf949e12684d7772f647eb7bf48bf21774bd4

php-snmp-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 890e5417bee83f55ef331ae09f62f605f4220ed4dd20d5b96257c6997f5a89d6

php-soap-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 1b1dbfe0c00736f0a1200a0ede9062ff8e5f7a16fcfc96fa22ce7896aa6a7321

php-soap-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: e969fb20dcd1429de980aa8421b08df2380b21a723a8a7dc7357d22fe3b78620

php-xml-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 46408768c83f747e24f244f4f6e6f9b35dca556651cc897f8f8801f745e873ed

php-xml-debuginfo-8.0.27-1.module+el8.7.0+17863+0ad92cd2.aarch64.rpm

SHA-256: 6e75bce15ddf582e16bed6543147da59368282066d96fdded945145915993dca

Related news

Gentoo Linux Security Advisory 202408-32

Gentoo Linux Security Advisory 202408-32 - Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service. Versions greater than or equal to 8.1.29:8.1 are affected.

Ubuntu Security Notice USN-6524-1

Ubuntu Security Notice 6524-1 - Nicky Mouha discovered that PyPy incorrectly handled certain SHA-3 operations. An attacker could possibly use this issue to cause PyPy to crash, resulting in a denial of service, or possibly execute arbitrary code.

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVE-2023-22062: Oracle Critical Patch Update Advisory - July 2023

Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).

CVE-2023-26298: HP Device Manager Security Updates

Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges.

GHSA-6w4m-2xhg-2658: Buffer overflow in sponge queue functions

### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a). ### Workarounds The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether. ### References See [issue #105](https://github.com/XKCP/XKCP/issues/105) for more details.

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

Ubuntu Security Notice USN-5931-1

Ubuntu Security Notice 5931-1 - It was discovered that Python incorrectly handled certain inputs. If a user or an automated system were tricked into running a specially crafted input, a remote attacker could possibly use this issue to execute arbitrary code.

Ubuntu Security Notice USN-5905-1

Ubuntu Security Notice 5905-1 - It was discovered that PHP incorrectly handled certain gzip files. An attacker could possibly use this issue to cause a denial of service. It was discovered that PHP incorrectly handled certain cookies. An attacker could possibly use this issue to compromise data integrity. It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

Ubuntu Security Notice USN-5888-1

Ubuntu Security Notice 5888-1 - It was discovered that Python incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. Hamza Avvan discovered that Python incorrectly handled certain inputs. If a user or an automated system were tricked into running a specially crafted input, a remote attacker could possibly use this issue to execute arbitrary code.

RHSA-2023:0965: Red Hat Security Advisory: php security update

An update for php is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31628: A vulnerability was found in PHP due to an infinite loop within the phar uncompressor code when processing "quines" gzip files. This vulnerability allows a remote attacker to pass a specially crafted archive to the application, and consume all available system resources, causing a denial of service condition. * CVE-2022-31629: A vulnerability was fou...

Debian Security Advisory 5363-1

Debian Linux Security Advisory 5363-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in denial of service or incorrect validation of BCrypt hashes.

Red Hat Security Advisory 2023-0848-01

Red Hat Security Advisory 2023-0848-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include buffer overflow and integer overflow vulnerabilities.

Ubuntu Security Notice USN-5818-1

Ubuntu Security Notice 5818-1 - It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

CVE-2023-0036: en/security-disclosure/2023/2023-01.md · OpenHarmony/security - Gitee.com

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Ubuntu Security Notice USN-5767-1

Ubuntu Security Notice 5767-1 - Nicky Mouha discovered that Python incorrectly handled certain SHA-3 internals. An attacker could possibly use this issue to cause a crash or execute arbitrary code. It was discovered that Python incorrectly handled certain IDNA inputs. An attacker could possibly use this issue to expose sensitive information denial of service, or cause a crash.

Gentoo Linux Security Advisory 202211-03

Gentoo Linux Security Advisory 202211-3 - Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. Versions less than 7.4.33:7.4 are affected.

Gentoo Linux Security Advisory 202211-03

Gentoo Linux Security Advisory 202211-3 - Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. Versions less than 7.4.33:7.4 are affected.

Gentoo Linux Security Advisory 202211-03

Gentoo Linux Security Advisory 202211-3 - Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. Versions less than 7.4.33:7.4 are affected.

Gentoo Linux Security Advisory 202211-03

Gentoo Linux Security Advisory 202211-3 - Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. Versions less than 7.4.33:7.4 are affected.

Debian Security Advisory 5277-1

Debian Linux Security Advisory 5277-1 - Multiple security issues were discovered in PHP, a widely-used open source general purpose scripting language which could result an denial of service, information disclosure, insecure cooking handling or potentially the execution of arbitrary code.

Debian Security Advisory 5277-1

Debian Linux Security Advisory 5277-1 - Multiple security issues were discovered in PHP, a widely-used open source general purpose scripting language which could result an denial of service, information disclosure, insecure cooking handling or potentially the execution of arbitrary code.

Debian Security Advisory 5277-1

Debian Linux Security Advisory 5277-1 - Multiple security issues were discovered in PHP, a widely-used open source general purpose scripting language which could result an denial of service, information disclosure, insecure cooking handling or potentially the execution of arbitrary code.

Debian Security Advisory 5277-1

Debian Linux Security Advisory 5277-1 - Multiple security issues were discovered in PHP, a widely-used open source general purpose scripting language which could result an denial of service, information disclosure, insecure cooking handling or potentially the execution of arbitrary code.

CVE-2022-31630: OOB read due to insufficient input validation in imageloadfont()

In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information.

Ubuntu Security Notice USN-5717-1

Ubuntu Security Notice 5717-1 - It was discovered that PHP incorrectly handled certain gzip files. An attacker could possibly use this issue to cause a denial of service. It was discovered that PHP incorrectly handled certain cookies. An attacker could possibly use this issue to compromise the data It was discovered that PHP incorrectly handled certain image fonts. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.

Ubuntu Security Notice USN-5717-1

Ubuntu Security Notice 5717-1 - It was discovered that PHP incorrectly handled certain gzip files. An attacker could possibly use this issue to cause a denial of service. It was discovered that PHP incorrectly handled certain cookies. An attacker could possibly use this issue to compromise the data It was discovered that PHP incorrectly handled certain image fonts. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.

Ubuntu Security Notice USN-5717-1

Ubuntu Security Notice 5717-1 - It was discovered that PHP incorrectly handled certain gzip files. An attacker could possibly use this issue to cause a denial of service. It was discovered that PHP incorrectly handled certain cookies. An attacker could possibly use this issue to compromise the data It was discovered that PHP incorrectly handled certain image fonts. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.

Ubuntu Security Notice USN-5717-1

Ubuntu Security Notice 5717-1 - It was discovered that PHP incorrectly handled certain gzip files. An attacker could possibly use this issue to cause a denial of service. It was discovered that PHP incorrectly handled certain cookies. An attacker could possibly use this issue to compromise the data It was discovered that PHP incorrectly handled certain image fonts. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.

Debian Security Advisory 5269-1

Debian Linux Security Advisory 5269-1 - Nicky Mouha discovered a buffer overflow in the sha3 module of PyPy, a fast, compliant alternative implementation of the Python language.

Debian Security Advisory 5267-1

Debian Linux Security Advisory 5267-1 - Nicky Mouha discovered a buffer overflow in 'sha3', a Python library for the SHA-3 hashing functions.

CVE-2022-37454

The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.

CVE-2022-31628: You must be logged in

In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.

CVE-2022-31629: You must be logged in

In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.