From c0aa228abbf6e0b93782a030b9a16ac887c9dc9a Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Wed, 2 Aug 2023 11:54:41 +0200 Subject: Fix Security issue with external entity loading in XML without enabling it GHSA-3qrf-m4j2-pcrr CVE-2023-3823 Fix Buffer mismanagement in phar_dir_read() GHSA-jqcx-ccgc-xwhv CVE-2023-3824 --- php56.spec | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) (limited to 'php56.spec') diff --git a/php56.spec b/php56.spec index 5464f07..b111c83 100644 --- a/php56.spec +++ b/php56.spec @@ -143,7 +143,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: 5.6.40 -Release: 38%{?dist} +Release: 39%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -261,6 +261,8 @@ Patch260: php-bug81744.patch Patch261: php-bug81746.patch Patch262: php-cve-2023-0662.patch Patch263: php-cve-2023-3247.patch +Patch264: php-cve-2023-3823.patch +Patch265: php-cve-2023-3824.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1081,6 +1083,8 @@ echo CIBLE = %{name}-%{version}-%{release} oci8=%{with_oci8} libzip=%{with_libzi %patch -P261 -p1 -b .bug81746 %patch -P262 -p1 -b .cve0662 %patch -P263 -p1 -b .cve3247 +%patch -P264 -p1 -b .cve3823 +%patch -P265 -p1 -b .cve3824 # Fixes for tests %patch -P300 -p1 -b .datetests @@ -2137,6 +2141,12 @@ EOF %changelog +* Wed Aug 2 2023 Remi Collet - 5.6.40-39 +- Fix Security issue with external entity loading in XML without enabling it + GHSA-3qrf-m4j2-pcrr CVE-2023-3823 +- Fix Buffer mismanagement in phar_dir_read() + GHSA-jqcx-ccgc-xwhv CVE-2023-3824 + * Wed Jun 21 2023 Remi Collet - 5.6.40-38 - fix possible buffer overflow in date -- cgit