From e609f5e89e40e413e916176bb1bbbcc3e8170300 Mon Sep 17 00:00:00 2001 From: Remi Collet Date: Tue, 1 Aug 2023 16:31:39 +0200 Subject: Fix Security issue with external entity loading in XML without enabling it GHSA-3qrf-m4j2-pcrr CVE-2023-3823 Fix Buffer mismanagement in phar_dir_read() GHSA-jqcx-ccgc-xwhv CVE-2023-3824 --- php71.spec | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) (limited to 'php71.spec') diff --git a/php71.spec b/php71.spec index 0490b7d..4dbbf1f 100644 --- a/php71.spec +++ b/php71.spec @@ -109,7 +109,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: %{upver}%{?rcver:~%{rcver}} -Release: 26%{?dist} +Release: 27%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -208,6 +208,8 @@ Patch235: php-bug81744.patch Patch236: php-bug81746.patch Patch237: php-cve-2023-0662.patch Patch238: php-cve-2023-3247.patch +Patch239: php-cve-2023-3823.patch +Patch240: php-cve-2023-3824.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -1099,6 +1101,8 @@ support for JavaScript Object Notation (JSON) to PHP. %patch -P236 -p1 -b .bug81746 %patch -P237 -p1 -b .cve0662 %patch -P238 -p1 -b .cve3247 +%patch -P239 -p1 -b .cve3823 +%patch -P240 -p1 -b .cve3824 # Fixes for tests %if 0%{?fedora} >= 25 || 0%{?rhel} >= 6 @@ -2173,6 +2177,12 @@ EOF %changelog +* Tue Aug 1 2023 Remi Collet - 7.1.33-27 +- Fix Security issue with external entity loading in XML without enabling it + GHSA-3qrf-m4j2-pcrr CVE-2023-3823 +- Fix Buffer mismanagement in phar_dir_read() + GHSA-jqcx-ccgc-xwhv CVE-2023-3824 + * Wed Jun 21 2023 Remi Collet - 7.1.33-26 - fix possible buffer overflow in date -- cgit