<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/scl-php74/php.git/php-cve-2026-7568.patch, branch master</title>
<subtitle>The master git repository for php RPM</subtitle>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php74/php.git/'/>
<entry>
<title>Fix XSS within status endpoint</title>
<updated>2026-05-12T07:21:23+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2026-05-12T07:21:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git.remirepo.net/cgit/rpms/scl-php74/php.git/commit/?id=88edb703ae6141870d45d0dee0e131aa55f807c4'/>
<id>88edb703ae6141870d45d0dee0e131aa55f807c4</id>
<content type='text'>
  CVE-2026-6735
Fix Stale SOAP_GLOBAL(ref_map) pointer with Apache Map
  CVE-2026-6722
Fix Use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION
  CVE-2026-7261
Fix Broken Apache map value NULL check
  CVE-2026-7262
Fix Signed integer overflow of char array offset
  CVE-2026-7568
Fix Consistently pass unsigned char to ctype.h functions
  CVE-2026-7258
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2026-6735
Fix Stale SOAP_GLOBAL(ref_map) pointer with Apache Map
  CVE-2026-6722
Fix Use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION
  CVE-2026-7261
Fix Broken Apache map value NULL check
  CVE-2026-7262
Fix Signed integer overflow of char array offset
  CVE-2026-7568
Fix Consistently pass unsigned char to ctype.h functions
  CVE-2026-7258
</pre>
</div>
</content>
</entry>
</feed>
