php-5.4.45-12.el5.remi.i386.rpm


Advertisement

Description

php - PHP scripting language for creating dynamic web sites

Distribution: CentOS 5
Repository: Les RPM de Remi i386
Package name: php
Package version: 5.4.45
Package release: 12.el5.remi
Package architecture: i386
Package type: rpm
Installed size: 8.30 MB
Download size: 3.17 MB
Official Mirror: rpms.famillecollet.com
PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server.

Provides

  • config(php) = 5.4.45-12.el5.remi
  • libphp5.so
  • mod_php = 5.4.45-12.el5.remi
  • php = 5.4.45-12.el5.remi
  • php-zts = 5.4.45-12.el5.remi

Obsoletes

  • php53
  • php53u
  • php54 > 5.4
  • php54w

    Download

    Source package: php-5.4.45-12.el5.remi.src.rpm

    Install Howto

    1. Download the latest remi-release rpm from
      http://rpms.famillecollet.com/enterprise/5/remi/i386/
    2. Install remi-release rpm:
      # rpm -Uvh remi-release*rpm
    3. Install php rpm package:
      # yum --enablerepo=remi install php

    Files

    • /etc/httpd/conf.d/php.conf
    • /usr/lib/httpd/modules/libphp5-zts.so
    • /usr/lib/httpd/modules/libphp5.so
    • /var/lib/php/session/
    • /var/www/icons/php.gif

    Changelog

    2016-09-19 - Remi Collet <remi@fedoraproject.org> 5.4.45-12 - fix #72627: Memory Leakage In exif_process_IFD_in_TIFF CVE-2016-7128 - fix #72926: Uninitialized Thumbail Data Leads To Memory Leakage in exif_process_IFD_in_TIFF - fix #73035: Out of bound when verify signature of tar phar - fix #72928: Out of bound when verify signature of zip phar CVE-2016-7414 - fix #72735 regression in exif maker note parser

    2016-07-22 - Remi Collet <remi@fedoraproject.org> 5.4.45-11 - Fix #70480: php_url_parse_ex() buffer overflow read CVE-2016-6288 - Fix #69975: PHP segfaults when accessing nvarchar(max) defined columns - Fix #72479: Use After Free Vulnerability in SNMP with GC and unserialize() CVE-2016-6295 - Fix #72573: HTTP_PROXY is improperly trusted by some PHP libraries CVE-2016-5385 - Fix #72513: buffer overflow vulnerability in virtual_file_ex CVE-2016-6289 - Fix #72520: buffer overflow vulnerability in php_stream_zip_opener CVE-2016-6297 - Fix #72533: locale_accept_from_http out-of-bounds access CVE-2016-6294 - Fix #72562: Use After Free in unserialize() with Unexpected Session Deserialization CVE-2016-6290 - Fix #72603: Out of bound read in exif_process_IFD_in_MAKERNOTE CVE-2016-6291 - Fix #72606: heap-buffer-overflow (write) simplestring_addn simplestring.c CVE-2016-6296 - Partial fix #72613: do not treat negative returns from bz2 as size_t - Fix #72618: NULL Pointer Dereference in exif_process_user_comment CVE-2016-6292 - Fix #72519: possible OOB using imagegif

    2016-06-21 - Remi Collet <remi@fedoraproject.org> 5.4.45-10 - Fix #66387: Stack overflow with imagefilltoborder - Fix #72340: Double Free Courruption in wddx_deserialize CVE-2016-5772 - Fix #72275: don't allow smart_str to overflow int - Fix #72400: prevent signed int overflows for string lengths - Fix #72403: prevent signed int overflows for string lengths - Fix #72268: Integer Overflow in nl2br(). (Stas) - Fix #72339: Integer Overflow in _gd2GetHeader() resulting in heap overflow CVE-2016-5766 - Fix #72298: pass2_no_dither out-of-bounds access - Fix #72402: _php_mb_regex_ereg_replace_exec - double free CVE-2016-5768 - Fix #72433: SPL use After Free Vulnerability in PHP's GC CVE-2016-5771 - Fix #72434: ZipArchive class use After Free Vulnerability in PHP's GC CVE-2016-5773 - Fix #72455: Heap Overflow due to integer overflows CVE-2016-5769 - Fix #72446: Integer Overflow in gdImagePaletteToTrueColor() CVE-2016-5767

    2016-05-29 - Remi Collet <remi@fedoraproject.org> 5.4.45-9 - Fix #71331: Uninitialized pointer in phar_make_dirstream CVE-2016-4343 - Fix #72114: int/size_t confusion in fread CVE-2016-5096 - Add check for string overflow to all string add operations - Fix #72135: don't create strings with lengths outside int range CVE-2016-5094 - Fix #72241: get_icu_value_internal out-of-bounds read CVE-2016-5093

    2016-04-26 - Remi Collet <remi@fedoraproject.org> 5.4.45-8 - Fix #64938: libxml_disable_entity_loader setting is shared between threads CVE-2015-8866 - Fix #71912: libgd signedness vulnerability CVE-2016-3074 - Fix #72061: Out-of-bounds reads in zif_grapheme_stripos with negative offset CVE-2016-4540 CVE-2016-4541 - Fix #72093: bcpowmod accepts negative scale and corrupts _one_ definition CVE-2016-4537 CVE-2016-4538 - Fix #72094: Out of bounds heap read access in exif header processing CVE-2016-4542 CVE-2016-4543 CVE-2016-4544 - Fix #72099: xml_parse_into_struct segmentation fault CVE-2016-4539

    2016-03-29 - Remi Collet <remi@fedoraproject.org> 5.4.45-7 - Fix #71860: Require valid paths for phar filenames CVE-2016-4072 - Fix #71906: AddressSanitizer: negative-size-param in mbfl_strcut CVE-2016-4073 - Fix #71798: Integer Overflow in php_raw_url_encode CVE-2016-4070 - Fix #71704: php_snmp_error() Format String Vulnerability CVE-2016-4071 - Fix #71527: Buffer over-write in finfo_open with malformed magic file CVE-2015-8865

    Advertisement
    Advertisement