summaryrefslogtreecommitdiffstats
path: root/php56.spec
diff options
context:
space:
mode:
authorRemi Collet <remi@remirepo.net>2024-04-10 15:11:27 +0200
committerRemi Collet <remi@php.net>2024-04-10 15:11:27 +0200
commit1f27176f054fcd489f6da90a98f145c8f717b10f (patch)
tree3bbeea0646dec7211583441ed932287a9d963f5d /php56.spec
parente28b6b502950e11425f4350ce62026128650cbb8 (diff)
use oracle client library version 21.13 on x86_64, 19.19 on aarch64HEADmaster
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix CVE-2024-2756 Fix password_verify can erroneously return true opening ATO risk CVE-2024-3096
Diffstat (limited to 'php56.spec')
-rw-r--r--php56.spec17
1 files changed, 14 insertions, 3 deletions
diff --git a/php56.spec b/php56.spec
index 84d2a43..9c1c2c8 100644
--- a/php56.spec
+++ b/php56.spec
@@ -33,7 +33,7 @@
%global oraclelib 19.1
%global oracledir 19.19
%else
-%global oraclever 21.11
+%global oraclever 21.13
%global oraclelib 21.1
%global oracledir 21
%endif
@@ -150,7 +150,7 @@
Summary: PHP scripting language for creating dynamic web sites
Name: php
Version: 5.6.40
-Release: 39%{?dist}
+Release: 40%{?dist}
# All files licensed under PHP version 3.01, except
# Zend is licensed under Zend
# TSRM is licensed under BSD
@@ -270,6 +270,8 @@ Patch262: php-cve-2023-0662.patch
Patch263: php-cve-2023-3247.patch
Patch264: php-cve-2023-3823.patch
Patch265: php-cve-2023-3824.patch
+Patch266: php-cve-2024-2756.patch
+Patch267: php-cve-2024-3096.patch
# Fixes for tests (300+)
# Factory is droped from system tzdata
@@ -1093,6 +1095,8 @@ echo CIBLE = %{name}-%{version}-%{release} oci8=%{with_oci8} libzip=%{with_libzi
%patch -P263 -p1 -b .cve3247
%patch -P264 -p1 -b .cve3823
%patch -P265 -p1 -b .cve3824
+%patch -P266 -p1 -b .cve2756
+%patch -P267 -p1 -b .cve3096
# Fixes for tests
%patch -P300 -p1 -b .datetests
@@ -1962,7 +1966,7 @@ cat << EOF
WARNING : PHP 5.6 have reached its "End of Life" in
January 2019. Even, if this package includes some of
- the important security fixes, backported from 8.0, the
+ the important security fixes, backported from 8.1, the
UPGRADE to a maintained version is very strongly RECOMMENDED.
=====================================================================
@@ -2141,6 +2145,13 @@ EOF
%changelog
+* Wed Apr 10 2024 Remi Collet <remi@remirepo.net> - 5.6.40-40
+- use oracle client library version 21.13 on x86_64, 19.19 on aarch64
+- Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
+ CVE-2024-2756
+- Fix password_verify can erroneously return true opening ATO risk
+ CVE-2024-3096
+
* Wed Aug 2 2023 Remi Collet <remi@remirepo.net> - 5.6.40-39
- Fix Security issue with external entity loading in XML without enabling it
GHSA-3qrf-m4j2-pcrr CVE-2023-3823