Oracle Linux 9 : php:8.3 (ELSA-2026-1429)

high Nessus Plugin ID 297097

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2026-1429 advisory.

php [8.3.29-1]
- rebase to 8.3.29

php-pecl-apcu [5.1.23-1]
- update to 5.1.23 for PHP 8.2 RHEL-14699

[5.1.21-1]
- update to 5.1.21 for PHP 8.1 #2070040

php-pecl-redis6 [6.1.0-2]
- ignore 1 ONLINE test

[6.1.0-1]
- RHEL build

[6.1.0-1]
- update to 6.1.0
- drop patch merged upstream

[6.1.0~RC2-1]
- update to 6.1.0RC2
- fix test suite with redis 6.2 using patch from https://github.com/phpredis/phpredis/pull/2555

[6.0.2-3]
- cleanup and modernize spec file

[6.0.2-2]
- use valkey on Fedora 41
- add upstream patch for PHP 8.4

[6.0.2-1]
- update to 6.0.2

[6.0.1-1]
- update to 6.0.1

[6.0.0-1]
- cleanup SCL stuff for Fedora review

[6.0.0-1]
- update to 6.0.0

php-pecl-rrd [2.0.3-4]
- build for PHP 8.1 #2070040

[2.0.3-3]
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688

[2.0.3-2]
- Rebuilt for RHEL 9 BETA for openssl 3.0 Related: rhbz#1971065

[2.0.3-1]
- update to 2.0.3

[2.0.2-1]
- update to 2.0.2

[2.0.1-17]
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937

[2.0.1-16]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild

[2.0.1-15]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild

php-pecl-xdebug3 [3.3.1-1]
- update to 3.3.1 for PHP 8.3

[3.2.2-2]
- drop inet_ntoa usage using upstream patch

[3.2.2-1]
- update to 3.2.2 for PHP 8.2 RHEL-14699

php-pecl-zip [1.22.3-1]
- update to 1.22.3 for PHP 8.2 RHEL-14699

[1.20.1-1]
- update to 1.20.1 for PHP 8.1 #2070040

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2026-1429.html

Plugin Details

Severity: High

ID: 297097

File Name: oraclelinux_ELSA-2026-1429.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/29/2026

Updated: 1/29/2026

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C

CVSS Score Source: CVE-2025-14178

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 8.2

Threat Score: 6.9

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-14180

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:php-pecl-apcu-devel, p-cpe:/a:oracle:linux:php-gd, p-cpe:/a:oracle:linux:php-pecl-rrd, p-cpe:/a:oracle:linux:php-pecl-redis6, p-cpe:/a:oracle:linux:php-odbc, p-cpe:/a:oracle:linux:php-process, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:php-xml, p-cpe:/a:oracle:linux:php-intl, p-cpe:/a:oracle:linux:php-mysqlnd, p-cpe:/a:oracle:linux:php-mbstring, p-cpe:/a:oracle:linux:php-pecl-zip, p-cpe:/a:oracle:linux:php-pgsql, p-cpe:/a:oracle:linux:apcu-panel, p-cpe:/a:oracle:linux:php-ldap, p-cpe:/a:oracle:linux:php-ffi, p-cpe:/a:oracle:linux:php-devel, p-cpe:/a:oracle:linux:php-gmp, p-cpe:/a:oracle:linux:php-fpm, p-cpe:/a:oracle:linux:php-enchant, p-cpe:/a:oracle:linux:php-pecl-xdebug3, p-cpe:/a:oracle:linux:php-common, p-cpe:/a:oracle:linux:php-dbg, p-cpe:/a:oracle:linux:php-pecl-apcu, p-cpe:/a:oracle:linux:php-opcache, p-cpe:/a:oracle:linux:php-snmp, p-cpe:/a:oracle:linux:php-pdo, p-cpe:/a:oracle:linux:php-bcmath, p-cpe:/a:oracle:linux:php-soap, p-cpe:/a:oracle:linux:php-embedded, p-cpe:/a:oracle:linux:php-cli, p-cpe:/a:oracle:linux:php-dba, p-cpe:/a:oracle:linux:php

Required KB Items: Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list, Host/local_checks_enabled

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/28/2026

Vulnerability Publication Date: 12/17/2025

Reference Information

CVE: CVE-2025-14177, CVE-2025-14178, CVE-2025-14180

IAVA: 2026-A-0020