From 951dbf0af3a424edd8468f50570a709dc8b6db25 Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Mon, 24 Oct 2022 10:42:31 +0200 Subject: hash: fix #81738: buffer overflow in hash_update() on long parameter. CVE-2022-37454 --- php72.spec | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) (limited to 'php72.spec') diff --git a/php72.spec b/php72.spec index 03ecd29..b29a5de 100644 --- a/php72.spec +++ b/php72.spec @@ -110,7 +110,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: %{upver}%{?rcver:~%{rcver}} -Release: 13%{?dist} +Release: 14%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -189,6 +189,7 @@ Patch208: php-bug81719.patch Patch209: php-bug81720.patch Patch210: php-bug81727.patch Patch211: php-bug81726.patch +Patch212: php-bug81738.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1133,6 +1134,7 @@ low-level PHP extension for the libsodium cryptographic library. %patch209 -p1 -b .bug81720 %patch210 -p1 -b .bug81727 %patch211 -p1 -b .bug81726 +%patch212 -p1 -b .bug81738 # Fixes for tests %if 0%{?fedora} >= 25 || 0%{?rhel} >= 6 @@ -2246,6 +2248,10 @@ EOF %changelog +* Mon Oct 24 2022 Remi Collet - 7.2.34-14 +- hash: fix #81738: buffer overflow in hash_update() on long parameter. + CVE-2022-37454 + * Tue Sep 27 2022 Remi Collet - 7.2.34-13 - phar: fix #81726 DOS when using quine gzip file. CVE-2022-31628 - core: fix #81727 Don't mangle HTTP variable names that clash with ones -- cgit