From 738a69da96784d7eb9425de2b39d50e6f3cb9b91 Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Wed, 15 Feb 2023 11:41:42 +0100 Subject: fix #81744: Password_verify() always return true with some hash CVE-2023-0567 fix #81746: 1-byte array overrun in common path resolve code CVE-2023-0568 fix DOS vulnerability when parsing multipart request body CVE-2023-0662 --- php56.spec | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) (limited to 'php56.spec') diff --git a/php56.spec b/php56.spec index cd6dc82..72cee1e 100644 --- a/php56.spec +++ b/php56.spec @@ -143,7 +143,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: 5.6.40 -Release: 35%{?dist} +Release: 36%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -257,6 +257,9 @@ Patch256: php-bug81720.patch Patch257: php-bug81727.patch Patch258: php-bug81726.patch Patch259: php-bug81740.patch +Patch260: php-bug81744.patch +Patch261: php-bug81746.patch +Patch262: php-cve-2023-0662.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1073,6 +1076,9 @@ echo CIBLE = %{name}-%{version}-%{release} oci8=%{with_oci8} libzip=%{with_libzi %patch257 -p1 -b .bug81727 %patch258 -p1 -b .bug81726 %patch259 -p1 -b .bug81740 +%patch260 -p1 -b .bug81744 +%patch261 -p1 -b .bug81746 +%patch262 -p1 -b .cve0662 # Fixes for tests %patch300 -p1 -b .datetests @@ -2129,6 +2135,14 @@ EOF %changelog +* Tue Feb 14 2023 Remi Collet - 5.6.40-36 +- fix #81744: Password_verify() always return true with some hash + CVE-2023-0567 +- fix #81746: 1-byte array overrun in common path resolve code + CVE-2023-0568 +- fix DOS vulnerability when parsing multipart request body + CVE-2023-0662 + * Tue Dec 20 2022 Remi Collet - 5.6.40-35 - pdo: fix #81740: PDO::quote() may return unquoted string CVE-2022-31631 -- cgit