summaryrefslogtreecommitdiffstats
path: root/php72.spec
diff options
context:
space:
mode:
authorRemi Collet <remi@remirepo.net>2024-09-27 08:48:20 +0200
committerRemi Collet <remi@php.net>2024-09-27 08:48:20 +0200
commita0a70a22d639fa152b53ad1e90a43cd2544a5537 (patch)
tree1475734112571bcd8095fd7aaaeafd1e821d655e /php72.spec
parentc98243bac22339a8347912b031a7a75133c79053 (diff)
Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGIHEADmaster
CVE-2024-4577 Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability CVE-2024-8926 Fix cgi.force_redirect configuration is bypassable due to the environment variable collision CVE-2024-8927 Fix Erroneous parsing of multipart form data CVE-2024-8925
Diffstat (limited to 'php72.spec')
-rw-r--r--php72.spec23
1 files changed, 20 insertions, 3 deletions
diff --git a/php72.spec b/php72.spec
index 106be0d..adaef8e 100644
--- a/php72.spec
+++ b/php72.spec
@@ -26,10 +26,10 @@
%global mysql_sock %(mysql_config --socket 2>/dev/null || echo /var/lib/mysql/mysql.sock)
%ifarch aarch64
-%global oraclever 19.23
+%global oraclever 19.24
%global oraclemax 20
%global oraclelib 19.1
-%global oracledir 19.23
+%global oracledir 19.24
%else
%global oraclever 23.5
%global oraclemax 24
@@ -123,7 +123,7 @@
Summary: PHP scripting language for creating dynamic web sites
Name: php
Version: %{upver}%{?rcver:~%{rcver}}
-Release: 23%{?dist}
+Release: 24%{?dist}
# All files licensed under PHP version 3.01, except
# Zend is licensed under Zend
# TSRM is licensed under BSD
@@ -213,6 +213,9 @@ Patch219: php-cve-2023-3824.patch
Patch220: php-cve-2024-2756.patch
Patch221: php-cve-2024-3096.patch
Patch222: php-cve-2024-5458.patch
+Patch223: php-cve-2024-8925.patch
+Patch224: php-cve-2024-8926.patch
+Patch225: php-cve-2024-8927.patch
# Fixes for tests (300+)
# Factory is droped from system tzdata
@@ -1171,6 +1174,9 @@ low-level PHP extension for the libsodium cryptographic library.
%patch -P220 -p1 -b .cve2756
%patch -P221 -p1 -b .cve3096
%patch -P222 -p1 -b .cve5458
+%patch -P223 -p1 -b .cve8925
+%patch -P224 -p1 -b .cve8926
+%patch -P225 -p1 -b .cve8927
# Fixes for tests
%if 0%{?fedora} >= 25 || 0%{?rhel} >= 6
@@ -2278,6 +2284,17 @@ EOF
%changelog
+%changelog
+* Thu Sep 26 2024 Remi Collet <remi@remirepo.net> - 7.2.34-24
+- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
+ CVE-2024-4577
+- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
+ CVE-2024-8926
+- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
+ CVE-2024-8927
+- Fix Erroneous parsing of multipart form data
+ CVE-2024-8925
+
* Wed Jul 31 2024 Remi Collet <remi@remirepo.net> - 7.2.34-23
- use oracle client library version 23.5 on x86_64