<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/scl-php72/php.git, branch master</title>
<subtitle>The master git repository for php RPM</subtitle>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/'/>
<entry>
<title>Fix Heap buffer overflow in array_merge()</title>
<updated>2026-02-18T07:11:52+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2026-02-18T07:11:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=df9a0dfee3c4e5f4b1fb8aed3e22455c4cb7a548'/>
<id>df9a0dfee3c4e5f4b1fb8aed3e22455c4cb7a548</id>
<content type='text'>
  CVE-2025-14178
use oracle client library version 23.26 on x86_64 and aarch64
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2025-14178
use oracle client library version 23.26 on x86_64 and aarch64
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface</title>
<updated>2024-11-26T07:46:54+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-11-26T07:46:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=388235a088d8a480e6f76e0b1aae963300d296e2'/>
<id>388235a088d8a480e6f76e0b1aae963300d296e2</id>
<content type='text'>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI</title>
<updated>2024-09-27T06:48:34+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-09-27T06:48:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=4454063e72dc91b2ac53e4fbdba257ccc909fd8a'/>
<id>4454063e72dc91b2ac53e4fbdba257ccc909fd8a</id>
<content type='text'>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 23.5 on x86_64</title>
<updated>2024-07-31T09:10:28+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-07-31T09:10:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=07d77230143a23644279acbd6ce9712c5f7178d3'/>
<id>07d77230143a23644279acbd6ce9712c5f7178d3</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix filter bypass in filter_var FILTER_VALIDATE_URL</title>
<updated>2024-06-05T06:22:21+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-06-05T06:22:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=9298687f80170e93b01098be5b295d281111946b'/>
<id>9298687f80170e93b01098be5b295d281111946b</id>
<content type='text'>
  CVE-2024-5458
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-5458
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.13 on x86_64, 19.19 on aarch64</title>
<updated>2024-04-10T12:08:19+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-04-10T12:08:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=b29cf1ba8a46669076cfad17a86fb5e8ee5218dc'/>
<id>b29cf1ba8a46669076cfad17a86fb5e8ee5218dc</id>
<content type='text'>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.11 on x86_64, 19.19 on aarch64</title>
<updated>2023-10-16T08:12:44+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-10-16T08:12:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=39ccf9a25add6a2c78ae239c58c4de16db3af754'/>
<id>39ccf9a25add6a2c78ae239c58c4de16db3af754</id>
<content type='text'>
use official Oracle Instant Client RPM
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
use official Oracle Instant Client RPM
</pre>
</div>
</content>
</entry>
<entry>
<title>use official Oracle Instant Client RPM</title>
<updated>2023-09-22T08:26:42+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-09-22T08:26:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=af50b631ab9afd88efcdb909372eda8fe7e94d00'/>
<id>af50b631ab9afd88efcdb909372eda8fe7e94d00</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Security issue with external entity loading in XML without enabling it</title>
<updated>2023-08-01T14:08:10+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-08-01T14:08:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=3812d43d43dbfafedd9b4e36f0374a076dcb3278'/>
<id>3812d43d43dbfafedd9b4e36f0374a076dcb3278</id>
<content type='text'>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</pre>
</div>
</content>
</entry>
<entry>
<title>fix possible buffer overflow in date</title>
<updated>2023-06-21T08:05:21+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-21T08:05:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php72/php.git/commit/?id=8da122209fa1562074a584866397816211e24681'/>
<id>8da122209fa1562074a584866397816211e24681</id>
<content type='text'>
define %php72___phpize and %php72___phpconfig
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
define %php72___phpize and %php72___phpconfig
</pre>
</div>
</content>
</entry>
</feed>
