diff options
author | Remi Collet <remi@remirepo.net> | 2024-09-26 17:54:34 +0200 |
---|---|---|
committer | Remi Collet <remi@php.net> | 2024-09-26 17:54:34 +0200 |
commit | 71ae6061a38ab8f32e52120633cd8d23bcddfac4 (patch) | |
tree | 8b2da4f205caa851045a27ad093e2b2b7602919a /php73.spec | |
parent | d49233a890e00aba4d412f1ed9b15832f3f40fef (diff) |
CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
CVE-2024-8927
Fix Erroneous parsing of multipart form data
CVE-2024-8925
Diffstat (limited to 'php73.spec')
-rw-r--r-- | php73.spec | 22 |
1 files changed, 19 insertions, 3 deletions
@@ -26,10 +26,10 @@ %global mysql_sock %(mysql_config --socket 2>/dev/null || echo /var/lib/mysql/mysql.sock) %ifarch aarch64 -%global oraclever 19.23 +%global oraclever 19.24 %global oraclemax 20 %global oraclelib 19.1 -%global oracledir 19.23 +%global oracledir 19.24 %else %global oraclever 23.5 %global oraclemax 24 @@ -124,7 +124,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: %{upver}%{?rcver:~%{rcver}} -Release: 15%{?dist} +Release: 16%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -212,6 +212,9 @@ Patch211: php-cve-2023-3824.patch Patch212: php-cve-2024-2756.patch Patch213: php-cve-2024-3096.patch Patch214: php-cve-2024-5458.patch +Patch215: php-cve-2024-8925.patch +Patch216: php-cve-2024-8926.patch +Patch217: php-cve-2024-8927.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1215,6 +1218,9 @@ low-level PHP extension for the libsodium cryptographic library. %patch -P212 -p1 -b .cve2756 %patch -P213 -p1 -b .cve3096 %patch -P214 -p1 -b .cve5458 +%patch -P215 -p1 -b .cve8925 +%patch -P216 -p1 -b .cve8926 +%patch -P217 -p1 -b .cve8927 # Fixes for tests %if 0%{?fedora} >= 25 || 0%{?rhel} >= 6 @@ -2309,6 +2315,16 @@ EOF %changelog +* Thu Sep 26 2024 Remi Collet <remi@remirepo.net> - 7.3.33-16 +- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI + CVE-2024-4577 +- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability + CVE-2024-8926 +- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision + CVE-2024-8927 +- Fix Erroneous parsing of multipart form data + CVE-2024-8925 + * Wed Jul 31 2024 Remi Collet <remi@remirepo.net> - 7.3.33-15 - use oracle client library version 23.5 on x86_64 |