<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/scl-php71/php.git, branch master</title>
<subtitle>The master git repository for php RPM</subtitle>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/'/>
<entry>
<title>Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface</title>
<updated>2024-11-26T11:04:31+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-11-26T11:04:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=e78fd22632c92dbb1c01dc16797eead09f2affd9'/>
<id>e78fd22632c92dbb1c01dc16797eead09f2affd9</id>
<content type='text'>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI</title>
<updated>2024-09-27T07:16:21+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-09-27T07:16:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=0a7d8ea9433e5dfe45c285961e3780de7a5625b2'/>
<id>0a7d8ea9433e5dfe45c285961e3780de7a5625b2</id>
<content type='text'>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 23.5 on x86_64</title>
<updated>2024-07-31T09:10:16+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-07-31T09:10:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=7ed85155fa41ddaeaea2ce2d7fa3125be6dc5e66'/>
<id>7ed85155fa41ddaeaea2ce2d7fa3125be6dc5e66</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix filter bypass in filter_var FILTER_VALIDATE_URL</title>
<updated>2024-06-05T07:29:51+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-06-05T07:29:51+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=9b00dbce376f61fb3c4851d3c003c3345023da23'/>
<id>9b00dbce376f61fb3c4851d3c003c3345023da23</id>
<content type='text'>
  CVE-2024-5458
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-5458
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.13 on x86_64, 19.19 on aarch64</title>
<updated>2024-04-10T12:33:08+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-04-10T12:33:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=7d6d185e42d3bdeeffbc8d5b6837ef3b1459beef'/>
<id>7d6d185e42d3bdeeffbc8d5b6837ef3b1459beef</id>
<content type='text'>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</pre>
</div>
</content>
</entry>
<entry>
<title>use official Oracle Instant Client RPM</title>
<updated>2023-09-22T08:26:21+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-09-22T08:26:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=0d1c7585332c58bde922f257b952283aabca1e9d'/>
<id>0d1c7585332c58bde922f257b952283aabca1e9d</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Security issue with external entity loading in XML without enabling it</title>
<updated>2023-08-01T14:31:52+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-08-01T14:31:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=c262fe02b6293bdce558e1b07f94973fad80c2a6'/>
<id>c262fe02b6293bdce558e1b07f94973fad80c2a6</id>
<content type='text'>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</pre>
</div>
</content>
</entry>
<entry>
<title>fix possible buffer overflow in date</title>
<updated>2023-06-21T08:35:54+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-21T08:35:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=9cce51403ccd8617d6348a15ca8642bcd76cc6ce'/>
<id>9cce51403ccd8617d6348a15ca8642bcd76cc6ce</id>
<content type='text'>
define %php71___phpize and %php71___phpconfig
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
define %php71___phpize and %php71___phpconfig
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Missing error check and insufficient random bytes in HTTP Digest</title>
<updated>2023-06-07T10:00:02+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-07T10:00:02+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=f4871e69a193dd95dc9814dd01a82f433e8eead0'/>
<id>f4871e69a193dd95dc9814dd01a82f433e8eead0</id>
<content type='text'>
  authentication for SOAP
  GHSA-76gg-c692-v2mw
use oracle client library version 21.10
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  authentication for SOAP
  GHSA-76gg-c692-v2mw
use oracle client library version 21.10
</pre>
</div>
</content>
</entry>
<entry>
<title>fix #81744: Password_verify() always return true with some hash</title>
<updated>2023-02-15T09:38:19+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-02-15T09:38:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=a3a86755b6862c0d12ffde785217e0840ba14e4d'/>
<id>a3a86755b6862c0d12ffde785217e0840ba14e4d</id>
<content type='text'>
  CVE-2023-0567
fix #81746: 1-byte array overrun in common path resolve code
  CVE-2023-0568
fix DOS vulnerability when parsing multipart request body
  CVE-2023-0662
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2023-0567
fix #81746: 1-byte array overrun in common path resolve code
  CVE-2023-0568
fix DOS vulnerability when parsing multipart request body
  CVE-2023-0662
</pre>
</div>
</content>
</entry>
</feed>
