diff options
Diffstat (limited to 'php73.spec')
-rw-r--r-- | php73.spec | 77 |
1 files changed, 67 insertions, 10 deletions
@@ -26,13 +26,15 @@ %global mysql_sock %(mysql_config --socket 2>/dev/null || echo /var/lib/mysql/mysql.sock) %ifarch aarch64 -%global oraclever 19.19 +%global oraclever 19.24 +%global oraclemax 20 %global oraclelib 19.1 -%global oracledir 19.19 +%global oracledir 19.24 %else -%global oraclever 21.13 -%global oraclelib 21.1 -%global oracledir 21 +%global oraclever 23.6 +%global oraclemax 24 +%global oraclelib 23.1 +%global oracledir 23 %endif # Build for LiteSpeed Web Server (LSAPI) @@ -122,7 +124,7 @@ Summary: PHP scripting language for creating dynamic web sites Name: php Version: %{upver}%{?rcver:~%{rcver}} -Release: 13%{?dist} +Release: 18%{?dist} # All files licensed under PHP version 3.01, except # Zend is licensed under Zend # TSRM is licensed under BSD @@ -209,6 +211,16 @@ Patch210: php-cve-2023-3823.patch Patch211: php-cve-2023-3824.patch Patch212: php-cve-2024-2756.patch Patch213: php-cve-2024-3096.patch +Patch214: php-cve-2024-5458.patch +Patch215: php-cve-2024-8925.patch +Patch216: php-cve-2024-8926.patch +Patch217: php-cve-2024-8927.patch +Patch218: php-cve-2024-11236.patch +Patch219: php-cve-2024-11234.patch +Patch220: php-cve-2024-8932.patch +Patch221: php-cve-2024-11233.patch +Patch222: php-ghsa-4w77-75f9-2c8w.patch +Patch223: php-cve-2024-8929.patch # Fixes for tests (300+) # Factory is droped from system tzdata @@ -755,7 +767,7 @@ BuildRequires: oracle-instantclient%{oraclever}-devel Requires: libclntsh.so.%{oraclelib} AutoReq: 0 %else -BuildRequires: oracle-instantclient-devel >= %{oraclever} +BuildRequires: (oracle-instantclient-devel >= %{oraclever} with oracle-instantclient-devel < %{oraclemax}) %endif Requires: php-pdo%{?_isa} = %{version}-%{release} Provides: php_database @@ -1056,12 +1068,14 @@ Group: System Environment/Libraries # All files licensed under PHP version 3.01 License: PHP Requires: php-common%{?_isa} = %{version}-%{release} +%if 0%{?rhel} # Upstream requires 4.0, we require 69.1 to ensure use of libicu69 BuildRequires: libicu-devel = 69.1 -%if 0%{?rhel} Obsoletes: php53-intl, php53u-intl, php54-intl, php54w-intl, php55u-intl, php55w-intl, php56u-intl, php56w-intl Obsoletes: php70u-intl, php70w-intl, php71u-intl, php71w-intl, php72u-intl, php72w-intl Obsoletes: php73-intl, php73w-intl +%else +BuildRequires: libicu-devel %endif %description intl @@ -1209,6 +1223,16 @@ low-level PHP extension for the libsodium cryptographic library. %patch -P211 -p1 -b .cve3824 %patch -P212 -p1 -b .cve2756 %patch -P213 -p1 -b .cve3096 +%patch -P214 -p1 -b .cve5458 +%patch -P215 -p1 -b .cve8925 +%patch -P216 -p1 -b .cve8926 +%patch -P217 -p1 -b .cve8927 +%patch -P218 -p1 -b .cve11236 +%patch -P219 -p1 -b .cve11234 +%patch -P220 -p1 -b .cve8932 +%patch -P221 -p1 -b .cve11233 +%patch -P222 -p1 -b .ghsa4w77 +%patch -P223 -p1 -b .cve8929 # Fixes for tests %if 0%{?fedora} >= 25 || 0%{?rhel} >= 6 @@ -2115,7 +2139,7 @@ cat << EOF WARNING : PHP 7.3 have reached its "End of Life" in December 2021. Even, if this package includes some of - the important security fixes, backported from 8.0, the + the important security fixes, backported from 8.1, the UPGRADE to a maintained version is very strongly RECOMMENDED. ===================================================================== @@ -2303,8 +2327,41 @@ EOF %changelog +* Wed Nov 27 2024 Remi Collet <remi@remirepo.net> - 7.3.33-18 +- Fix Leak partial content of the heap through heap buffer over-read + CVE-2024-8929 + +* Fri Nov 22 2024 Remi Collet <remi@remirepo.net> - 7.3.33-17 +- Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface + GHSA-4w77-75f9-2c8w +- Fix OOB access in ldap_escape + CVE-2024-8932 +- Fix Integer overflow in the dblib/firebird quoter causing OOB writes + CVE-2024-11236 +- Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs + CVE-2024-11234 +- Fix Single byte overread with convert.quoted-printable-decode filter + CVE-2024-11233 + +* Thu Sep 26 2024 Remi Collet <remi@remirepo.net> - 7.3.33-16 +- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI + CVE-2024-4577 +- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability + CVE-2024-8926 +- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision + CVE-2024-8927 +- Fix Erroneous parsing of multipart form data + CVE-2024-8925 + +* Wed Jul 31 2024 Remi Collet <remi@remirepo.net> - 7.3.33-15 +- use oracle client library version 23.5 on x86_64 + +* Tue Jun 4 2024 Remi Collet <remi@remirepo.net> - 7.3.33-14 +- Fix filter bypass in filter_var FILTER_VALIDATE_URL + CVE-2024-5458 + * Wed Apr 10 2024 Remi Collet <remi@remirepo.net> - 7.3.33-13 -- use oracle client library version 21.11 on x86_64, 19.19 on aarch64 +- use oracle client library version 21.13 on x86_64, 19.19 on aarch64 - Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix CVE-2024-2756 - Fix password_verify can erroneously return true opening ATO risk |