<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/php/php72.git, branch master</title>
<subtitle>The master git repository for php72 RPM</subtitle>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/'/>
<entry>
<title>Fix Heap buffer overflow in array_merge()</title>
<updated>2026-02-18T07:12:00+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2026-02-18T07:12:00+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=5145912848dfacc957b649c7a44c159bb1f1edf4'/>
<id>5145912848dfacc957b649c7a44c159bb1f1edf4</id>
<content type='text'>
  CVE-2025-14178
use oracle client library version 23.26 on x86_64 and aarch64
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2025-14178
use oracle client library version 23.26 on x86_64 and aarch64
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface</title>
<updated>2024-11-26T07:46:40+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-11-26T07:46:40+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=91c8e7e3b1573d64222ecc3c2dfceabaa667f86f'/>
<id>91c8e7e3b1573d64222ecc3c2dfceabaa667f86f</id>
<content type='text'>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI</title>
<updated>2024-09-27T06:48:20+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-09-27T06:48:20+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=a0a70a22d639fa152b53ad1e90a43cd2544a5537'/>
<id>a0a70a22d639fa152b53ad1e90a43cd2544a5537</id>
<content type='text'>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 23.5 on x86_64</title>
<updated>2024-07-31T09:10:40+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-07-31T09:10:40+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=c98243bac22339a8347912b031a7a75133c79053'/>
<id>c98243bac22339a8347912b031a7a75133c79053</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix filter bypass in filter_var FILTER_VALIDATE_URL</title>
<updated>2024-06-05T06:21:46+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-06-05T06:21:46+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=7a10cb429bc937b8417a7abba498af05b430a0df'/>
<id>7a10cb429bc937b8417a7abba498af05b430a0df</id>
<content type='text'>
  CVE-2024-5458
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-5458
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.13 on x86_64, 19.19 on aarch64</title>
<updated>2024-04-10T12:07:30+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-04-10T12:07:30+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=84b7252a9b2f24360e7d207831985af6a731a11a'/>
<id>84b7252a9b2f24360e7d207831985af6a731a11a</id>
<content type='text'>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.11 on x86_64, 19.19 on aarch64</title>
<updated>2023-10-16T09:30:37+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-10-16T09:30:37+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=5315b0db84187ac598e72118511d03f9f80c29f9'/>
<id>5315b0db84187ac598e72118511d03f9f80c29f9</id>
<content type='text'>
use official Oracle Instant Client RPM
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
use official Oracle Instant Client RPM
</pre>
</div>
</content>
</entry>
<entry>
<title>use official Oracle Instant Client RPM</title>
<updated>2023-09-22T08:16:39+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-09-22T08:16:39+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=46cccc4b6730edb59e9c842af30675888478e554'/>
<id>46cccc4b6730edb59e9c842af30675888478e554</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Security issue with external entity loading in XML without enabling it</title>
<updated>2023-08-01T14:10:50+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-08-01T14:10:50+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=dfc58509e22a55c7e41bb2cc91d1777dcb24c1a3'/>
<id>dfc58509e22a55c7e41bb2cc91d1777dcb24c1a3</id>
<content type='text'>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</pre>
</div>
</content>
</entry>
<entry>
<title>fix possible buffer overflow in date</title>
<updated>2023-06-21T08:05:58+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-21T08:05:58+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php72.git/commit/?id=087014d9921e0f09df40c50b865ae355026e9a6e'/>
<id>087014d9921e0f09df40c50b865ae355026e9a6e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
