summaryrefslogtreecommitdiffstats
path: root/php71.spec
diff options
context:
space:
mode:
authorRemi Collet <remi@remirepo.net>2024-04-10 14:31:17 +0200
committerRemi Collet <remi@php.net>2024-04-10 14:31:17 +0200
commitb3e24c777fe6ea82822992fb815a4ed7775336e9 (patch)
tree460293e0dfb441bcf00d8f90b1ea8089947a4a48 /php71.spec
parent0f6af7fa89a8f4d8b3c1b49f79a9bd9cd675e856 (diff)
use oracle client library version 21.13 on x86_64, 19.19 on aarch64
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix CVE-2024-2756 Fix password_verify can erroneously return true opening ATO risk CVE-2024-3096
Diffstat (limited to 'php71.spec')
-rw-r--r--php71.spec17
1 files changed, 14 insertions, 3 deletions
diff --git a/php71.spec b/php71.spec
index 9f9c5b5..ff15726 100644
--- a/php71.spec
+++ b/php71.spec
@@ -31,7 +31,7 @@
%global oraclelib 19.1
%global oracledir 19.19
%else
-%global oraclever 21.11
+%global oraclever 21.13
%global oraclelib 21.1
%global oracledir 21
%endif
@@ -116,7 +116,7 @@
Summary: PHP scripting language for creating dynamic web sites
Name: php
Version: %{upver}%{?rcver:~%{rcver}}
-Release: 27%{?dist}
+Release: 28%{?dist}
# All files licensed under PHP version 3.01, except
# Zend is licensed under Zend
# TSRM is licensed under BSD
@@ -217,6 +217,8 @@ Patch237: php-cve-2023-0662.patch
Patch238: php-cve-2023-3247.patch
Patch239: php-cve-2023-3823.patch
Patch240: php-cve-2023-3824.patch
+Patch241: php-cve-2024-2756.patch
+Patch242: php-cve-2024-3096.patch
# Fixes for tests (300+)
# Factory is droped from system tzdata
@@ -1111,6 +1113,8 @@ support for JavaScript Object Notation (JSON) to PHP.
%patch -P238 -p1 -b .cve3247
%patch -P239 -p1 -b .cve3823
%patch -P240 -p1 -b .cve3824
+%patch -P241 -p1 -b .cve2756
+%patch -P242 -p1 -b .cve3096
# Fixes for tests
%if 0%{?fedora} >= 25 || 0%{?rhel} >= 6
@@ -1994,7 +1998,7 @@ cat << EOF
WARNING : PHP 7.1 have reached its "End of Life" in
December 2019. Even, if this package includes some of
- the important security fixes, backported from 8.0, the
+ the important security fixes, backported from 8.1, the
UPGRADE to a maintained version is very strongly RECOMMENDED.
=====================================================================
@@ -2177,6 +2181,13 @@ EOF
%changelog
+* Wed Apr 10 2024 Remi Collet <remi@remirepo.net> - 7.1.33-28
+- use oracle client library version 21.13 on x86_64, 19.19 on aarch64
+- Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
+ CVE-2024-2756
+- Fix password_verify can erroneously return true opening ATO risk
+ CVE-2024-3096
+
* Tue Aug 1 2023 Remi Collet <remi@remirepo.net> - 7.1.33-27
- Fix Security issue with external entity loading in XML without enabling it
GHSA-3qrf-m4j2-pcrr CVE-2023-3823