[security - medium] php:7.4 security update
エラータID: AXSA:2026-182:01
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Leak partial content of the heap through heap buffer over-read in mysqlnd (CVE-2024-8929)
* php: Single byte overread with convert.quoted-printable-decode filter (CVE-2024-11233)
* php: Configuring a proxy in a stream context might allow for CRLF injection in URIs (CVE-2024-11234)
* php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
* php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
* php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
* php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
* php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
* php: pgsql extension does not check for errors during escaping (CVE-2025-1735)
* php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix (CVE-2025-6491)
* php: PHP Hostname Null Character Vulnerability (CVE-2025-1220)
* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)
* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-11233
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
CVE-2024-11234
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
CVE-2024-8929
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.
CVE-2025-1217
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc.
CVE-2025-1219
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations.
CVE-2025-1220
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.
CVE-2025-14177
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.
CVE-2025-14178
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.
CVE-2025-1734
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers.
CVE-2025-1735
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This could cause crashes if Postgres server rejects the string as invalid.
CVE-2025-1736
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted.
CVE-2025-1861
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.
CVE-2025-6491
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server.
Modularity name: "php"
Stream name: "7.4"
Update packages.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc.
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations.
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers.
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This could cause crashes if Postgres server rejects the string as invalid.
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted.
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.
In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (>2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server.
N/A
SRPMS
- libzip-1.6.1-1.module+el8+1951+f267e5d7.src.rpm
MD5: d6924238502764469e7bf39446be62c5
SHA-256: 0e78d4d8d2198822a1540997771cbf3fbcc7a5f9d0ef1cfd8105e2e6f1adadf3
Size: 732.66 kB - php-pear-1.10.13-1.module+el8+1951+f267e5d7.src.rpm
MD5: 3b9a9622ce1460f3d0f333555ba05755
SHA-256: f524603bd11ea32647d990800affae3d22f52ee36f12ce3d10f7cb87c2a6c45f
Size: 380.39 kB - php-pecl-apcu-5.1.18-1.module+el8+1951+f267e5d7.src.rpm
MD5: 83717835d0bf78004716234671a6997f
SHA-256: ddc787dc5c221c6b3173b98968b0502a0124d2ce3321d483e418b464e8f29412
Size: 107.49 kB - php-pecl-rrd-2.0.1-1.module+el8+1951+f267e5d7.src.rpm
MD5: 93caebb6378752d692fa2a8f2bdc0586
SHA-256: 10ea7326f5171ebb8c107d22d8e63d07a40724ea926c5fae2de0a662cb4cd865
Size: 33.11 kB - php-pecl-xdebug-2.9.5-1.module+el8+1951+f267e5d7.src.rpm
MD5: 8cb058f70c8aabca2793339aa38feb92
SHA-256: 2d1e5e85cb8f56938e19a3cdd34c3d17784e58b3864c3abe56bb1788d3251b2a
Size: 442.81 kB - php-pecl-zip-1.18.2-1.module+el8+1951+f267e5d7.src.rpm
MD5: c6e46d63244e45e7c92360e4fb8c9ef2
SHA-256: 3173f0c0f6e9ae4c5be8de3771b614ed4ec5f547d1381ded05764c6476df4d0c
Size: 307.81 kB - php-7.4.33-3.module+el8+1951+f267e5d7.src.rpm
MD5: f18b42678f14a795684dfdb755651823
SHA-256: 062426f410497080a0a6828a7b4e54ca3dbe636fcd2b9701f74e09555e348a4b
Size: 10.17 MB
Asianux Server 8 for x86_64
- apcu-panel-5.1.18-1.module+el8+1951+f267e5d7.noarch.rpm
MD5: f343883f56f1621131a3b533e91b148b
SHA-256: ddc649468dd20aa15c6de2978b99eb25656a359bbfd7e2669231cce75e0d8db1
Size: 22.29 kB - libzip-1.6.1-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 19f41dec97d9ef12bd9e3d11e296ba8d
SHA-256: d626a9da49b281231bce36594b0ef7d845cd8019c9ab3c980dbb604e9e4afe42
Size: 63.24 kB - libzip-debugsource-1.6.1-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: e12fbf6f04eeebd8ff26a4eb3edb221f
SHA-256: ae7c6fbf36f7031eb54f6f1e1a4d9ab7289007bf1ad3a619d9829b021cfffa78
Size: 100.33 kB - libzip-devel-1.6.1-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: f2294bff2c0bd3710e1783fc825206aa
SHA-256: 39d936827ec490ff823aabe7d9d8051f00f4d7bc43f98dcaf4af596749aac49a
Size: 180.03 kB - libzip-tools-1.6.1-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: e06421c918ec70b7dd32889a85017e61
SHA-256: 737d257b7d54ac7954384a00845c0e60dcc830b38e3564a777d0a98405fc19d1
Size: 42.91 kB - php-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: dd834903b52b9525781d41642c338188
SHA-256: a755f6f83aaf0a47d10f30dd98d9e7afb22d2d960210ce4a16b280784a81a1e0
Size: 1.52 MB - php-bcmath-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: e051f194ad2f041af969f31439d91cce
SHA-256: c2f4b54bfafa610da90a076e2ae916a4c3423e686af3c1e2062055a8133f0331
Size: 81.52 kB - php-cli-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 9071e3d7daaf93de242934512bebcba2
SHA-256: 2a1d9c77798f45c9c1f9a8e357b4c550c6c33bf5052d75a3efc1bf6566d88f8b
Size: 3.08 MB - php-common-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: cdbea6f958b52ff3a98cee58ee36c438
SHA-256: ef332ce8b8dc45a64d5d320ccdc843e8935a09bcd6a68d663dcb8a1132257d5e
Size: 708.76 kB - php-dba-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: d891c16ba83df0e7f70863c2989a30e0
SHA-256: f951635e56805faf08d1ab7ceac30d9aa1af086d0b164066533f3fc4012e821f
Size: 80.31 kB - php-dbg-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 1df91608e774fac10a6eec043d5884c9
SHA-256: 77b31de0bd13114ed4d3fc2a424b3bbfe420f6d07c739dfd62f762eb208fb81a
Size: 1.63 MB - php-debugsource-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 6d5a58f12d61e87da2761d3df7e4ae90
SHA-256: 7dfe79a8641ede8b0d7f7c4f3c8af1c1893a594f46fcecac459a739a35e5072b
Size: 4.12 MB - php-devel-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: c71ac3e7438a37e0c72a9b9efd4e5d02
SHA-256: 68e7543dc7743cc604543f24e74081f54e1e2ad7b907ae79c24bd3eb8a615e72
Size: 731.32 kB - php-embedded-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 0d4a9203d52cbe5d1e30db460b828d70
SHA-256: a4681c48065ea8ddae86b39340efdf46d9955291b12296b41ffbf86a0e6b9077
Size: 1.51 MB - php-enchant-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 97c0362e210ad61d28f1fbf46490b7b0
SHA-256: d11ed20911aac1f0af02437172bddb36314c1cc4987ad754e865c95bcd853f40
Size: 66.20 kB - php-ffi-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 9910b2cb0c2e5f5ba7156bc716dde71d
SHA-256: 5c95436c029e360beb75fc8f563e93a1315b014a1dfbdc5c27a396347b2988f9
Size: 118.49 kB - php-fpm-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 2e5e1051ac274d9fed7e676287ce1192
SHA-256: 1179d5f3e247d61cad29fac50f46bd2c75ee032b00563e21e632b6f23bbb0eca
Size: 1.61 MB - php-gd-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 9f7ed5c3d34cc78d5aedae5f4b8013e6
SHA-256: ed4f19c7ee15702c4b7b512ed8f6538e4675f202f4347f82122e924b1577eb97
Size: 86.35 kB - php-gmp-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: f7f3027a9c0d8b317904f7dc1387233e
SHA-256: 0876ee3707b317370264b9bf86ae2ee76dfcbcd2a265ef42822637a9ff6bb96d
Size: 78.15 kB - php-intl-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: aa21b912805c0170d5dd780a77395e4c
SHA-256: 7f1704c150ef07086ad323f0bc43447de4a202dd6ef3f75f00542a38c1d1dc16
Size: 194.38 kB - php-json-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 6e2b21bfb62b0c13af4cebb6e5a233f0
SHA-256: 8ec33fc0fa38b1739db73a5155954ccc8a17bb7c884baba81a06a2d9e6ef4342
Size: 75.74 kB - php-ldap-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: aebf62f957921389c9f16ac4ebceab64
SHA-256: 60bc39b384ab76d33c8d0a9ee19118d5e81a3aff2d8451f57a33ff090287902f
Size: 87.60 kB - php-mbstring-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: c65191fda75e344a0cffb42912300c46
SHA-256: 9b0c45259ee8a0487940217681fcd331aac93a202dcee4b3a1af532c0ae860c0
Size: 485.11 kB - php-mysqlnd-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 8bf842695d45dcea567921a1a5113c0c
SHA-256: 0fa7981cea7362b3a71553c4638e07a81d1c6686898e1b2884a266841cdecc11
Size: 194.85 kB - php-odbc-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 7cc16966ceec0fd795c84012e6aeba7f
SHA-256: 3998c91b082556a3d28003769df23e8dffcaad94b19bbf777b91b7f866b56388
Size: 91.52 kB - php-opcache-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 0672aaca04ca7b00c581a53fe93d547f
SHA-256: 51252b3afd264daf6fa3158292096580b2178e2dd649c903130471d9c8964105
Size: 268.68 kB - php-pdo-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 41e6b1a7520db8ee0e585cfa3e2401f3
SHA-256: 61310e367fc4d6b948f93bd5c819711e9c1b81d07127b52659b7fda48d985a52
Size: 124.61 kB - php-pear-1.10.13-1.module+el8+1951+f267e5d7.noarch.rpm
MD5: 3dc1241f8b4780d1d48cf1b39cef9ca9
SHA-256: 54f275cdb687712ca9bc28e77843782d1fb418292dffab9231af0618a1ff6179
Size: 360.50 kB - php-pecl-apcu-5.1.18-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: df8e82e5dd6496cb739da70d4e3abc34
SHA-256: 27bbf35be57ca1a93cb8d29cd46af39a9715d664dcef5484c41b929aa9424222
Size: 62.81 kB - php-pecl-apcu-debugsource-5.1.18-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: cf05c4b1a73fb5a7537086a295ac640f
SHA-256: 3b691cb183769d4a9bb8dfcc09785d85dac9f4dfcdedea355ed1ca743a153cdf
Size: 49.52 kB - php-pecl-apcu-devel-5.1.18-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 61c36de4c07ced505786cf6ae9abb18a
SHA-256: f2823af663d1b4531e5b74dd4aaadd6134bf9a2f6945580cbfd3c51afb065773
Size: 46.15 kB - php-pecl-rrd-2.0.1-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 4d39370b948b631d80ffdcbac7c5c6f7
SHA-256: 66993d5bf5faf7c4140f6a8c18d049edcdf30a3c55a26f96bac18b21a2e4e365
Size: 30.52 kB - php-pecl-rrd-debugsource-2.0.1-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 9e687125503fd328edab4f26ffd308eb
SHA-256: 9d75ecf924467d46a1d887ff397b6a6a2dfab965f0f3001f2254fe2184f9d6e2
Size: 22.38 kB - php-pecl-xdebug-2.9.5-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 25f8577e19be8d87881f1778c874ccac
SHA-256: a5bffe5467133f24abcee42ee3095a4f797f90af83fa6dd5b424679a1aa72e96
Size: 176.24 kB - php-pecl-xdebug-debugsource-2.9.5-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 1220aedda571c1386c26993620598954
SHA-256: 3e6f0f25a6b425a7dda148a0f9beac030dc127777d5597956c62ca7062c4efb2
Size: 134.23 kB - php-pecl-zip-1.18.2-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 23714295060a61094569bc60113044bb
SHA-256: 1614e6f22435a9923ab5c04eb7505526ccbc64b4ec276407eb80129b740a4ae0
Size: 53.57 kB - php-pecl-zip-debugsource-1.18.2-1.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 00f7e75724e194a97e1964fb96522443
SHA-256: 2d78c526e3d4402410d210e187a611b6b48b27ad936e7a8ce7ba00f25abcfd5d
Size: 31.19 kB - php-pgsql-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: ddc0e0ba8bb71014bb9d384a28be1efd
SHA-256: ef850d0a632c7f9bf2c57cbe36cdb03dcd3eeaf31ec9c643ff6b9e51b1837a65
Size: 120.77 kB - php-process-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 8d53d46558f361716f2623403bee2fdc
SHA-256: 8112508a711127589301b9ea93094fea7e05337b0473b9d6e7363aaff9208d97
Size: 86.68 kB - php-snmp-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 3c60b1054023154ac08c49a798c32722
SHA-256: 6c13359b8f3b255865be6bdc02d44626ea28cdd0f91ec6573c30ce55d3b87e76
Size: 76.00 kB - php-soap-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 968cb2c7802a799b7eef6a366403d098
SHA-256: 581ecec5f8d2e7b47caade22fb2c9f46fd1b8b9b55af82e9955f821ded4e6109
Size: 177.97 kB - php-xml-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: bab1eb2a2d40a90393419951e86d823c
SHA-256: 365b01fe8ef88306f604213b3ce394915fa06e3a880431fbdf6054c9ba4ea10b
Size: 176.91 kB - php-xmlrpc-7.4.33-3.module+el8+1951+f267e5d7.x86_64.rpm
MD5: 3faa62e105450da7a25953bba8d5705f
SHA-256: 4fee921b7b354bb3f6ebc5f548a5f9d7cd73349137677ebe139a734fb907ddef
Size: 91.30 kB