<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/scl-php70/php.git, branch master</title>
<subtitle>The master git repository for php RPM</subtitle>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/'/>
<entry>
<title>Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface</title>
<updated>2024-11-26T11:04:22+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-11-26T11:04:22+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=daf9b88c6cd0fe21b83f684e10dba7095d49605e'/>
<id>daf9b88c6cd0fe21b83f684e10dba7095d49605e</id>
<content type='text'>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI</title>
<updated>2024-09-27T07:58:37+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-09-27T07:58:37+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=04a009d3791ab5c8aeead7988076e6a5ffb6cbc9'/>
<id>04a009d3791ab5c8aeead7988076e6a5ffb6cbc9</id>
<content type='text'>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 23.5 on x86_64</title>
<updated>2024-07-31T09:10:09+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-07-31T09:10:09+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=6325fa517ce34105f1614520543b2da49b786263'/>
<id>6325fa517ce34105f1614520543b2da49b786263</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix filter bypass in filter_var FILTER_VALIDATE_URL</title>
<updated>2024-06-05T08:41:13+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-06-05T08:41:13+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=d4688638bf6ce9d2018a189d9364a8713b90b40e'/>
<id>d4688638bf6ce9d2018a189d9364a8713b90b40e</id>
<content type='text'>
  CVE-2024-5458
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-5458
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.13 on x86_64, 19.19 on aarch64</title>
<updated>2024-04-10T12:56:28+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-04-10T12:56:28+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=997d6f80d9b806bcdad4af50a785d271b65004bf'/>
<id>997d6f80d9b806bcdad4af50a785d271b65004bf</id>
<content type='text'>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</pre>
</div>
</content>
</entry>
<entry>
<title>use official Oracle Instant Client RPM</title>
<updated>2023-09-22T08:26:06+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-09-22T08:26:06+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=e51a3d1aa8197e659b0ed76baf4b9c8799788c48'/>
<id>e51a3d1aa8197e659b0ed76baf4b9c8799788c48</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Security issue with external entity loading in XML without enabling it</title>
<updated>2023-08-02T09:14:07+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-08-02T09:14:07+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=e2daa46b2fee0adf416031348a5e48960e2c663c'/>
<id>e2daa46b2fee0adf416031348a5e48960e2c663c</id>
<content type='text'>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</pre>
</div>
</content>
</entry>
<entry>
<title>fix possible buffer overflow in date</title>
<updated>2023-06-21T08:52:17+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-21T08:52:17+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=63df0c1397405e708ffb04201cf64c34c2f214e2'/>
<id>63df0c1397405e708ffb04201cf64c34c2f214e2</id>
<content type='text'>
define %php70___phpize and %php70___phpconfig
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
define %php70___phpize and %php70___phpconfig
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Missing error check and insufficient random bytes in HTTP Digest</title>
<updated>2023-06-07T10:23:13+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-06-07T10:23:13+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=4e1bc99284de106ea65bfbede27f48699bd132bd'/>
<id>4e1bc99284de106ea65bfbede27f48699bd132bd</id>
<content type='text'>
  authentication for SOAP
  GHSA-76gg-c692-v2mw
use oracle client library version 21.10
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  authentication for SOAP
  GHSA-76gg-c692-v2mw
use oracle client library version 21.10
</pre>
</div>
</content>
</entry>
<entry>
<title>fix #81744: Password_verify() always return true with some hash</title>
<updated>2023-02-15T10:13:26+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-02-15T10:13:26+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php70/php.git/commit/?id=4242469728c5089a3cbc80405cecc4a75e14367d'/>
<id>4242469728c5089a3cbc80405cecc4a75e14367d</id>
<content type='text'>
  CVE-2023-0567
fix #81746: 1-byte array overrun in common path resolve code
  CVE-2023-0568
fix DOS vulnerability when parsing multipart request body
  CVE-2023-0662
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2023-0567
fix #81746: 1-byte array overrun in common path resolve code
  CVE-2023-0568
fix DOS vulnerability when parsing multipart request body
  CVE-2023-0662
</pre>
</div>
</content>
</entry>
</feed>
