<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/php/php73.git/php-cve-2026-7261.patch, branch master</title>
<subtitle>The master git repository for php73 RPM</subtitle>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php73.git/'/>
<entry>
<title>Fix XSS within status endpoint</title>
<updated>2026-05-13T11:19:31+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2026-05-13T11:19:31+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/php/php73.git/commit/?id=fea2058e67e90dab8a7366fbde98941a3b61bf33'/>
<id>fea2058e67e90dab8a7366fbde98941a3b61bf33</id>
<content type='text'>
  CVE-2026-6735
Fix Stale SOAP_GLOBAL(ref_map) pointer with Apache Map
  CVE-2026-6722
Fix Use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION
  CVE-2026-7261
Fix Broken Apache map value NULL check
  CVE-2026-7262
Fix Signed integer overflow of char array offset
  CVE-2026-7568
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2026-6735
Fix Stale SOAP_GLOBAL(ref_map) pointer with Apache Map
  CVE-2026-6722
Fix Use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION
  CVE-2026-7261
Fix Broken Apache map value NULL check
  CVE-2026-7262
Fix Signed integer overflow of char array offset
  CVE-2026-7568
</pre>
</div>
</content>
</entry>
</feed>
