From ad578fac5ca84ea0050f4b25cd51fbd8535404a1 Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Wed, 15 Feb 2023 10:38:28 +0100 Subject: fix #81744: Password_verify() always return true with some hash CVE-2023-0567 fix #81746: 1-byte array overrun in common path resolve code CVE-2023-0568 fix DOS vulnerability when parsing multipart request body CVE-2023-0662 --- php71.spec | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) (limited to 'php71.spec') diff --git a/php71.spec b/php71.spec index eb5e61d..a9434a8 100644 --- a/php71.spec +++ b/php71.spec @@ -109,7 +109,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: %{upver}%{?rcver:~%{rcver}} -Release: 23%{?dist} +Release: 24%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -204,6 +204,9 @@ Patch231: php-bug81720.patch Patch232: php-bug81727.patch Patch233: php-bug81726.patch Patch234: php-bug81740.patch +Patch235: php-bug81744.patch +Patch236: php-bug81746.patch +Patch237: php-cve-2023-0662.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1091,6 +1094,9 @@ support for JavaScript Object Notation (JSON) to PHP. %patch232 -p1 -b .bug81727 %patch233 -p1 -b .bug81726 %patch234 -p1 -b .bug81740 +%patch235 -p1 -b .bug81744 +%patch236 -p1 -b .bug81746 +%patch237 -p1 -b .cve0662 # Fixes for tests %if 0%{?fedora} >= 25 || 0%{?rhel} >= 6 @@ -2165,6 +2171,14 @@ EOF %changelog +* Tue Feb 14 2023 Remi Collet - 7.1.33-24 +- fix #81744: Password_verify() always return true with some hash + CVE-2023-0567 +- fix #81746: 1-byte array overrun in common path resolve code + CVE-2023-0568 +- fix DOS vulnerability when parsing multipart request body + CVE-2023-0662 + * Mon Dec 19 2022 Remi Collet - 7.1.33-23 - pdo: fix #81740: PDO::quote() may return unquoted string CVE-2022-31631 -- cgit