From 4242469728c5089a3cbc80405cecc4a75e14367d Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Wed, 15 Feb 2023 11:13:26 +0100 Subject: fix #81744: Password_verify() always return true with some hash CVE-2023-0567 fix #81746: 1-byte array overrun in common path resolve code CVE-2023-0568 fix DOS vulnerability when parsing multipart request body CVE-2023-0662 --- php.spec | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) (limited to 'php.spec') diff --git a/php.spec b/php.spec index ffb1742..fff791c 100644 --- a/php.spec +++ b/php.spec @@ -127,7 +127,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: %{?scl_prefix}php Version: %{upver}%{?rcver:~%{rcver}} -Release: 36%{?dist} +Release: 37%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -253,6 +253,9 @@ Patch256: php-bug81720.patch Patch257: php-bug81727.patch Patch258: php-bug81726.patch Patch259: php-bug81740.patch +Patch260: php-bug81744.patch +Patch261: php-bug81746.patch +Patch262: php-cve-2023-0662.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1054,6 +1057,9 @@ sed -e 's/php-devel/%{?scl_prefix}php-devel/' -i scripts/phpize.in %patch257 -p1 -b .bug81727 %patch258 -p1 -b .bug81726 %patch259 -p1 -b .bug81740 +%patch260 -p1 -b .bug81744 +%patch261 -p1 -b .bug81746 +%patch262 -p1 -b .cve0662 : --------------------------- #exit 1 @@ -2011,6 +2017,14 @@ EOF %changelog +* Tue Feb 14 2023 Remi Collet - 7.0.33-37 +- fix #81744: Password_verify() always return true with some hash + CVE-2023-0567 +- fix #81746: 1-byte array overrun in common path resolve code + CVE-2023-0568 +- fix DOS vulnerability when parsing multipart request body + CVE-2023-0662 + * Tue Dec 20 2022 Remi Collet - 7.0.33-36 - pdo: fix #81740: PDO::quote() may return unquoted string CVE-2022-31631 -- cgit