<feed xmlns='http://www.w3.org/2005/Atom'>
<title>rpms/scl-php73/php.git, branch master</title>
<subtitle>The master git repository for php RPM</subtitle>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/'/>
<entry>
<title>Fix Heap buffer overflow in array_merge()</title>
<updated>2026-02-17T15:13:04+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2026-02-17T15:13:04+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=69bb2b7ce8c939bdd5cd9009bc5150506a16e2c7'/>
<id>69bb2b7ce8c939bdd5cd9009bc5150506a16e2c7</id>
<content type='text'>
  CVE-2025-14178
use oracle client library version 23.26 on x86_64 and aarch64
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2025-14178
use oracle client library version 23.26 on x86_64 and aarch64
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Leak partial content of the heap through heap buffer over-read</title>
<updated>2024-11-28T11:55:59+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-11-28T11:55:59+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=e26fae4ab4f46e04654f9c71aaceabc346010e28'/>
<id>e26fae4ab4f46e04654f9c71aaceabc346010e28</id>
<content type='text'>
  CVE-2024-8929
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-8929
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface</title>
<updated>2024-11-22T14:54:38+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-11-22T14:54:38+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=af789ffc0feead0cebc5801d3b629856c7cb8388'/>
<id>af789ffc0feead0cebc5801d3b629856c7cb8388</id>
<content type='text'>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-4w77-75f9-2c8w
Fix OOB access in ldap_escape
  CVE-2024-8932
Fix Integer overflow in the dblib/firebird quoter causing OOB writes
  CVE-2024-11236
Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
  CVE-2024-11234
Fix Single byte overread with convert.quoted-printable-decode filter
  CVE-2024-11233
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI</title>
<updated>2024-09-26T15:54:04+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-09-26T15:54:04+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=04f40453af68fffd4ebe218a43caaafd8bfabafc'/>
<id>04f40453af68fffd4ebe218a43caaafd8bfabafc</id>
<content type='text'>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-4577
Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
Fix Erroneous parsing of multipart form data
  CVE-2024-8925
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 23.5 on x86_64</title>
<updated>2024-07-31T08:52:58+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-07-31T08:52:58+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=5464a4c1f53a5d0b08b3229093d025a8908d4a82'/>
<id>5464a4c1f53a5d0b08b3229093d025a8908d4a82</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix filter bypass in filter_var FILTER_VALIDATE_URL</title>
<updated>2024-06-05T05:52:16+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-06-05T05:52:16+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=13a3244124b870632454ec8452fdcca0ebfe37af'/>
<id>13a3244124b870632454ec8452fdcca0ebfe37af</id>
<content type='text'>
  CVE-2024-5458
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  CVE-2024-5458
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.13 on x86_64, 19.19 on aarch64</title>
<updated>2024-04-10T10:23:20+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2024-04-10T10:23:20+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=3b831d483c7757c23b0b25885c6aab6ba5c7ed35'/>
<id>3b831d483c7757c23b0b25885c6aab6ba5c7ed35</id>
<content type='text'>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096
</pre>
</div>
</content>
</entry>
<entry>
<title>use oracle client library version 21.11 on x86_64, 19.19 on aarch64</title>
<updated>2023-10-16T08:12:22+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-10-16T08:12:22+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=ee5ecf2722eed03d20c5f164179e654345fdb318'/>
<id>ee5ecf2722eed03d20c5f164179e654345fdb318</id>
<content type='text'>
use official Oracle Instant Client RPM
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
use official Oracle Instant Client RPM
</pre>
</div>
</content>
</entry>
<entry>
<title>use official Oracle Instant Client RPM</title>
<updated>2023-09-22T08:26:56+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-09-22T08:26:56+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=996ce01045eb5c8c2adcfc1d870b3f9dc1fa357f'/>
<id>996ce01045eb5c8c2adcfc1d870b3f9dc1fa357f</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix Security issue with external entity loading in XML without enabling it</title>
<updated>2023-08-01T13:46:23+00:00</updated>
<author>
<name>Remi Collet</name>
<email>remi@remirepo.net</email>
</author>
<published>2023-08-01T13:46:23+00:00</published>
<link rel='alternate' type='text/html' href='http://rpms.remirepo.net/cgit/rpms/scl-php73/php.git/commit/?id=4cd70b4fae36d30414edfb40fc06fe6c16da30fb'/>
<id>4cd70b4fae36d30414edfb40fc06fe6c16da30fb</id>
<content type='text'>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  GHSA-3qrf-m4j2-pcrr CVE-2023-3823
Fix Buffer mismanagement in phar_dir_read()
  GHSA-jqcx-ccgc-xwhv CVE-2023-3824
move httpd/nginx wants directive to config files in /etc
</pre>
</div>
</content>
</entry>
</feed>
