Remi's RPM repository - Packages

Blog | Forum | Repository

php55-php-oci8 - A module for PHP applications that use OCI8 databases

Website:
http://www.php.net/
Licence:
PHP
Vendor:
Remi Collet
Description:
The php55-php-oci8 packages provides the OCI8 extension version 1.4.10
and the PDO driver to access Oracle Database.

The extension is linked with Oracle client libraries 12.1
(Oracle Instant Client).  For details, see Oracle's note
"Oracle Client / Server Interoperability Support" (ID 207303.1).

You must install libclntsh.so.12.1 to use this package, provided
in the database installation, or in the free Oracle Instant Client
available from Oracle.

Notice:
- php55-php-oci8 provides oci8 and pdo_oci extensions from php sources.
- php55-php-pecl-oci8 only provides oci8 extension.

Documentation is at http://php.net/oci8 and http://php.net/pdo_oci

Packages

php55-php-oci8-5.5.38-3.fc21.remi.x86_64 [110 KiB] Changelog by Remi Collet (2016-09-19):
- fix #72910: Out of bounds heap read in mbc_to_code()
- fix #72926: Uninitialized Thumbail Data Leads To Memory Leakage
  in exif_process_IFD_in_TIFF
- fix #72928: Out of bound when verify signature of zip phar
  CVE-2016-7414
- fix #73007: add locale length check
  CVE-2016-7416
- fix #72860: wddx_deserialize use-after-free
  CVE-2016-7413
- fix #73029: Missing type check when unserializing SplArray
  CVE-2016-7417
- fix #73052: Memory Corruption in During Deserialized-object Destruction
  CVE-2016-7411
- fix #73035: Out of bound when verify signature of tar phar
- fix #73065: Out-Of-Bounds Read in php_wddx_push_element of wddx.c
  CVE-2016-7418
php55-php-oci8-5.5.38-2.fc21.remi.x86_64 [109 KiB] Changelog by Remi Collet (2016-09-05):
- fix #72716: initialize buffer before read (ftp)
- fix #72663: destroy broken object when unserializing
  CVE-2016-7124
- fix #72681: consume data even if we're not storing them
  CVE-2016-7125
- fix #72708: php_snmp_parse_oid integer overflow in memory allocation
- fix #72749: wddx_deserialize allows illegal memory access
  CVE-2016-7129
- fix #70436: Use After Free Vulnerability in unserialize()
  CVE-2016-7129
- fix #72771: ftps:// opendir wrapper is vulnerable to protocol
  downgrade attack
- fix #72750: wddx_deserialize null dereference
  CVE-2016-7130
- fix #72627: Memory Leakage In exif_process_IFD_in_TIFF
  CVE-2016-7128
- fix #72697: select_colors write out-of-bounds
  CVE-2016-7126
- fix #72730: imagegammacorrect allows arbitrary write access
  CVE-2016-7127
- fix #72790: wddx_deserialize null dereference with invalid xml
  CVE-2016-7131
- fix #72799: wddx_deserialize null dereference in php_wddx_pop_element
  CVE-2016-7132
- fix #72807: do not produce strings with negative length
- fix #72836: integer overflow in base64_decode caused heap corruption
- fix #72837: integer overflow in bzdecompress caused heap corruption
- fix #72838: Integer overflow lead to heap corruption in sql_regcase
- fix #72848: integer overflow in quoted_printable_encode caused
  heap corruption
- fix #72849: integer overflow in urlencode
- fix #72850: integer overflow in uuencode