From 6c208f0f6be557bc2bd3fc3a5a5e69c1f3c8edbc Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Mon, 24 Oct 2022 10:01:32 +0200 Subject: hash: fix #81738: buffer overflow in hash_update() on long parameter. CVE-2022-37454 --- php.spec | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) (limited to 'php.spec') diff --git a/php.spec b/php.spec index 54f8587..9220058 100644 --- a/php.spec +++ b/php.spec @@ -126,7 +126,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: %{?scl_prefix}php Version: %{upver}%{?rcver:~%{rcver}} -Release: 5%{?dist} +Release: 6%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -202,6 +202,7 @@ Patch200: php-bug81719.patch Patch201: php-bug81720.patch Patch202: php-bug81727.patch Patch203: php-bug81726.patch +Patch204: php-bug81738.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -975,6 +976,7 @@ sed -e 's/php-devel/%{?scl_prefix}php-devel/' -i scripts/phpize.in %patch201 -p1 -b .bug81720 %patch202 -p1 -b .bug81727 %patch203 -p1 -b .bug81726 +%patch204 -p1 -b .bug81738 # Fixes for tests %patch300 -p1 -b .datetests @@ -1934,6 +1936,10 @@ EOF %changelog +* Mon Oct 24 2022 Remi Collet - 7.3.33-6 +- hash: fix #81738: buffer overflow in hash_update() on long parameter. + CVE-2022-37454 + * Tue Sep 27 2022 Remi Collet - 7.3.33-5 - phar: fix #81726 DOS when using quine gzip file. CVE-2022-31628 - core: fix #81727 Don't mangle HTTP variable names that clash with ones -- cgit