From cbf1928078b1cd36e9d5d0a96436fc80d850d674 Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Wed, 2 Aug 2023 11:13:55 +0200 Subject: Fix Security issue with external entity loading in XML without enabling it GHSA-3qrf-m4j2-pcrr CVE-2023-3823 Fix Buffer mismanagement in phar_dir_read() GHSA-jqcx-ccgc-xwhv CVE-2023-3824 --- php70.spec | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) (limited to 'php70.spec') diff --git a/php70.spec b/php70.spec index 7434f50..f0aa36f 100644 --- a/php70.spec +++ b/php70.spec @@ -109,7 +109,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: %{upver}%{?rcver:~%{rcver}} -Release: 39%{?dist} +Release: 40%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -232,6 +232,8 @@ Patch260: php-bug81744.patch Patch261: php-bug81746.patch Patch262: php-cve-2023-0662.patch Patch263: php-cve-2023-3247.patch +Patch264: php-cve-2023-3823.patch +Patch265: php-cve-2023-3824.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1150,6 +1152,8 @@ echo CIBLE = %{name}-%{version}-%{release} oci8=%{with_oci8} libzip=%{with_libzi %patch -P261 -p1 -b .bug81746 %patch -P262 -p1 -b .cve0662 %patch -P263 -p1 -b .cve3247 +%patch -P264 -p1 -b .cve3823 +%patch -P265 -p1 -b .cve3824 # Fixes for tests %if 0%{?fedora} >= 21 || 0%{?rhel} >= 5 @@ -2187,6 +2191,12 @@ fi %changelog +* Wed Aug 2 2023 Remi Collet - 7.0.33-40 +- Fix Security issue with external entity loading in XML without enabling it + GHSA-3qrf-m4j2-pcrr CVE-2023-3823 +- Fix Buffer mismanagement in phar_dir_read() + GHSA-jqcx-ccgc-xwhv CVE-2023-3824 + * Wed Jun 21 2023 Remi Collet - 7.0.33-39 - fix possible buffer overflow in date -- cgit