From 0a7d8ea9433e5dfe45c285961e3780de7a5625b2 Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Fri, 27 Sep 2024 09:16:21 +0200 Subject: Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI CVE-2024-4577 Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability CVE-2024-8926 Fix cgi.force_redirect configuration is bypassable due to the environment variable collision CVE-2024-8927 Fix Erroneous parsing of multipart form data CVE-2024-8925 --- php.spec | 22 +++++++++++++++++++--- 1 file changed, 19 insertions(+), 3 deletions(-) (limited to 'php.spec') diff --git a/php.spec b/php.spec index 0deac7b..17a81c6 100644 --- a/php.spec +++ b/php.spec @@ -56,10 +56,10 @@ %global mysql_sock %(mysql_config --socket 2>/dev/null || echo /var/lib/mysql/mysql.sock) %ifarch aarch64 -%global oraclever 19.23 +%global oraclever 19.24 %global oraclemax 20 %global oraclelib 19.1 -%global oracledir 19.23 +%global oracledir 19.24 %else %global oraclever 23.5 %global oraclemax 24 @@ -135,7 +135,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: %{?scl_prefix}php Version: %{upver}%{?rcver:~%{rcver}} -Release: 30%{?dist} +Release: 31%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -242,6 +242,9 @@ Patch240: php-cve-2023-3824.patch Patch241: php-cve-2024-2756.patch Patch242: php-cve-2024-3096.patch Patch243: php-cve-2024-5458.patch +Patch244: php-cve-2024-8925.patch +Patch245: php-cve-2024-8926.patch +Patch246: php-cve-2024-8927.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1021,6 +1024,9 @@ sed -e 's/php-devel/%{?scl_prefix}php-devel/' -i scripts/phpize.in %patch -P241 -p1 -b .cve2756 %patch -P242 -p1 -b .cve3096 %patch -P243 -p1 -b .cve5458 +%patch -P244 -p1 -b .cve8925 +%patch -P245 -p1 -b .cve8926 +%patch -P246 -p1 -b .cve8927 # Fixes for tests %patch -P300 -p1 -b .datetests @@ -1984,6 +1990,16 @@ EOF %changelog +* Thu Sep 26 2024 Remi Collet - 7.1.33-31 +- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI + CVE-2024-4577 +- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability + CVE-2024-8926 +- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision + CVE-2024-8927 +- Fix Erroneous parsing of multipart form data + CVE-2024-8925 + * Wed Jul 31 2024 Remi Collet - 7.1.33-30 - use oracle client library version 23.5 on x86_64 -- cgit