<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/scl-php71/php.git/php-cve-2026-6735.patch, branch master</title>
<subtitle>The master git repository for php RPM</subtitle>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php71/php.git/'/>
<entry>
<title>Fix XSS within status endpoint</title>
<updated>2026-05-13T14:16:02+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2026-05-13T14:16:02+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php71/php.git/commit/?id=9db8053269591f614b37c8782b4f3efb7c7f6628'/>
<id>9db8053269591f614b37c8782b4f3efb7c7f6628</id>
<content type='text'>
  CVE-2026-6735
Fix Stale SOAP_GLOBAL(ref_map) pointer with Apache Map
  CVE-2026-6722
Fix Use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION
  CVE-2026-7261
Fix Broken Apache map value NULL check
  CVE-2026-7262
Fix Signed integer overflow of char array offset
  CVE-2026-7568
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2026-6735
Fix Stale SOAP_GLOBAL(ref_map) pointer with Apache Map
  CVE-2026-6722
Fix Use-after-free after header parsing failure with SOAP_PERSISTENCE_SESSION
  CVE-2026-7261
Fix Broken Apache map value NULL check
  CVE-2026-7262
Fix Signed integer overflow of char array offset
  CVE-2026-7568
</pre>
</div>
</content>
</entry>
</feed>
