diff options
author | Remi Collet <remi@remirepo.net> | 2023-02-15 11:13:36 +0100 |
---|---|---|
committer | Remi Collet <remi@php.net> | 2023-02-15 11:13:36 +0100 |
commit | 9e35fd58eaa617754b416680e627ea991a106a7d (patch) | |
tree | b13b9ca70fa33f2333d69058f6e65be1b6434a7b /php70.spec | |
parent | 80d876b4f8d57b3b46c3d61cc6e8acb937820839 (diff) |
fix #81744: Password_verify() always return true with some hash
CVE-2023-0567
fix #81746: 1-byte array overrun in common path resolve code
CVE-2023-0568
fix DOS vulnerability when parsing multipart request body
CVE-2023-0662
Diffstat (limited to 'php70.spec')
-rw-r--r-- | php70.spec | 16 |
1 files changed, 15 insertions, 1 deletions
@@ -109,7 +109,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: %{upver}%{?rcver:~%{rcver}} -Release: 36%{?dist} +Release: 37%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -228,6 +228,9 @@ Patch256: php-bug81720.patch Patch257: php-bug81727.patch Patch258: php-bug81726.patch Patch259: php-bug81740.patch +Patch260: php-bug81744.patch +Patch261: php-bug81746.patch +Patch262: php-cve-2023-0662.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1142,6 +1145,9 @@ echo CIBLE = %{name}-%{version}-%{release} oci8=%{with_oci8} libzip=%{with_libzi %patch257 -p1 -b .bug81727 %patch258 -p1 -b .bug81726 %patch259 -p1 -b .bug81740 +%patch260 -p1 -b .bug81744 +%patch261 -p1 -b .bug81746 +%patch262 -p1 -b .cve0662 # Fixes for tests %if 0%{?fedora} >= 21 || 0%{?rhel} >= 5 @@ -2179,6 +2185,14 @@ fi %changelog +* Tue Feb 14 2023 Remi Collet <remi@remirepo.net> - 7.0.33-37 +- fix #81744: Password_verify() always return true with some hash + CVE-2023-0567 +- fix #81746: 1-byte array overrun in common path resolve code + CVE-2023-0568 +- fix DOS vulnerability when parsing multipart request body + CVE-2023-0662 + * Tue Dec 20 2022 Remi Collet <remi@remirepo.net> - 7.0.33-36 - pdo: fix #81740: PDO::quote() may return unquoted string CVE-2022-31631 |