<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/php/php71.git, branch master</title>
<subtitle>The master git repository for php71 RPM</subtitle>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/'/>
<entry>
<title>Fix filter bypass in filter_var FILTER_VALIDATE_URL</title>
<updated>2024-06-05T07:29:22+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-06-05T07:29:22+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=6ece0a982f310b4762ceccf9a957d97d9ed5ce23'/>
<id>6ece0a982f310b4762ceccf9a957d97d9ed5ce23</id>
<content type='text'>
  CVE-2024-5458
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-5458
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.13 on x86_64, 19.19 on aarch64</title>
<updated>2024-04-10T12:31:17+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-04-10T12:31:17+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=b3e24c777fe6ea82822992fb815a4ed7775336e9'/>
<id>b3e24c777fe6ea82822992fb815a4ed7775336e9</id>
<content type='text'>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</pre>
</div>
</content>
</entry>
<entry>
<title>use official Oracle Instant Client RPM</title>
<updated>2023-09-22T08:16:20+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-09-22T08:16:20+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=0f6af7fa89a8f4d8b3c1b49f79a9bd9cd675e856'/>
<id>0f6af7fa89a8f4d8b3c1b49f79a9bd9cd675e856</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Security issue with external entity loading in XML without enabling it</title>
<updated>2023-08-01T14:31:39+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-08-01T14:31:39+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=e609f5e89e40e413e916176bb1bbbcc3e8170300'/>
<id>e609f5e89e40e413e916176bb1bbbcc3e8170300</id>
<content type='text'>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
</pre>
</div>
</content>
</entry>
<entry>
<title>fix possible buffer overflow in date</title>
<updated>2023-06-21T08:36:07+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-21T08:36:07+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=d7703b357f346c2a65dc3e3f5adcd7a20ca73d46'/>
<id>d7703b357f346c2a65dc3e3f5adcd7a20ca73d46</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Missing error check and insufficient random bytes in HTTP Digest</title>
<updated>2023-06-07T09:39:23+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-07T09:39:23+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=5c6189c60bf3cb2105b08a73c45a02d578f3eac7'/>
<id>5c6189c60bf3cb2105b08a73c45a02d578f3eac7</id>
<content type='text'>
  authentication for SOAP
  GHSA-76gg-c692-v2mw
use oracle client library version 21.10
define __phpize and __phpconfig
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  authentication for SOAP
  GHSA-76gg-c692-v2mw
use oracle client library version 21.10
define __phpize and __phpconfig
</pre>
</div>
</content>
</entry>
<entry>
<title>fix #81744: Password_verify() always return true with some hash</title>
<updated>2023-02-15T09:38:28+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-02-15T09:38:28+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=ad578fac5ca84ea0050f4b25cd51fbd8535404a1'/>
<id>ad578fac5ca84ea0050f4b25cd51fbd8535404a1</id>
<content type='text'>
  CVE-2023-0567
fix #81746: 1-byte array overrun in common path resolve code
  CVE-2023-0568
fix DOS vulnerability when parsing multipart request body
  CVE-2023-0662
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2023-0567
fix #81746: 1-byte array overrun in common path resolve code
  CVE-2023-0568
fix DOS vulnerability when parsing multipart request body
  CVE-2023-0662
</pre>
</div>
</content>
</entry>
<entry>
<title>pdo: fix #81740: PDO::quote() may return unquoted string</title>
<updated>2022-12-20T07:00:41+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2022-12-20T07:00:41+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=d013369d0b6e77a3a5d391b7eccec64cc147d33e'/>
<id>d013369d0b6e77a3a5d391b7eccec64cc147d33e</id>
<content type='text'>
  CVE-2022-31631
use oracle client library version 21.8
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2022-31631
use oracle client library version 21.8
</pre>
</div>
</content>
</entry>
<entry>
<title>fix NEWS</title>
<updated>2022-09-30T07:27:50+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2022-09-30T07:27:50+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=d165045581a63e5bb34ac7d442d5094fb13ffc59'/>
<id>d165045581a63e5bb34ac7d442d5094fb13ffc59</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>phar: fix #81726 DOS when using quine gzip file. CVE-2022-31628</title>
<updated>2022-09-27T17:50:20+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2022-09-27T17:50:20+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php71.git/commit/?id=5fa30468c42dfa73b63dd7dbbfa39454dc08cadd'/>
<id>5fa30468c42dfa73b63dd7dbbfa39454dc08cadd</id>
<content type='text'>
core: fix #81727 Don't mangle HTTP variable names that clash with ones
  that have a specific semantic meaning. CVE-2022-31629
use oracle client library version 21.7
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
core: fix #81727 Don't mangle HTTP variable names that clash with ones
  that have a specific semantic meaning. CVE-2022-31629
use oracle client library version 21.7
</pre>
</div>
</content>
</entry>
</feed>
