The hardware and bandwidth for this mirror is donated by dogado GmbH, the Webhosting and Full Service-Cloud Provider. Check out our Wordpress Tutorial.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]dogado.de.

Remi's RPM repository - Packages

Blog | Support | Repository | Wizard

php-common - Common files for PHP

Website:
http://www.php.net/
Licence:
PHP-3.01 AND BSD-2-Clause
Vendor:
Remi's RPM repository <https://rpms.remirepo.net/> #StandWithUkraine
Description:
The php-common package contains files used by both the php
package and the php-cli package.

Packages

php-common-8.4.0~rc1-1.el8.remi.aarch64 [764 KiB] Changelog by Remi Collet (2024-09-24):
- Update to 8.4.0RC1
- bump ABI/API numbers
php-common-8.3.12-1.el8.remi.aarch64 [725 KiB] Changelog by Remi Collet (2024-09-25):
- Update to 8.3.12 - http://www.php.net/releases/8_3_12.php
php-common-8.3.11-1.el8.remi.aarch64 [724 KiB] Changelog by Remi Collet (2024-08-28):
- Update to 8.3.11 - http://www.php.net/releases/8_3_11.php
php-common-8.2.24-1.el8.remi.aarch64 [731 KiB] Changelog by Remi Collet (2024-09-25):
- Update to 8.2.24 - http://www.php.net/releases/8_2_24.php
php-common-8.2.23-1.el8.remi.aarch64 [730 KiB] Changelog by Remi Collet (2024-08-28):
- Update to 8.2.23 - http://www.php.net/releases/8_2_23.php
php-common-8.1.29-1.el8.remi.aarch64 [718 KiB] Changelog by Remi Collet (2024-06-05):
- Update to 8.1.29 - http://www.php.net/releases/8_1_29.php
php-common-8.1.28-1.el8.remi.aarch64 [718 KiB] Changelog by Remi Collet (2024-04-10):
- Update to 8.1.28 - http://www.php.net/releases/8_1_28.php
php-common-8.0.30-9.el8.remi.aarch64 [710 KiB] Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
  CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
- Fix Logs from childrens may be altered
  CVE-2024-9026
- Fix Erroneous parsing of multipart form data
  CVE-2024-8925
- use ICU 74.2
php-common-8.0.30-8.el8.remi.aarch64 [710 KiB] Changelog by Remi Collet (2024-07-31):
- add backport for https://bugs.php.net/79589
  error:14095126:SSL routines:ssl3_read_n:unexpected eof while reading
php-common-7.4.33-18.el8.remi.aarch64 [688 KiB] Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
  CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
- Fix Logs from childrens may be altered
  CVE-2024-9026
- Fix Erroneous parsing of multipart form data
  CVE-2024-8925
- use ICU 74.2
php-common-7.4.33-17.el8.remi.aarch64 [688 KiB] Changelog by Remi Collet (2024-08-26):
- add backport for https://bugs.php.net/79589
  error:14095126:SSL routines:ssl3_read_n:unexpected eof while reading
php-common-7.3.33-16.el8.remi.aarch64 [652 KiB] Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
  CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
- Fix Erroneous parsing of multipart form data
  CVE-2024-8925
php-common-7.3.33-14.el8.remi.aarch64 [652 KiB] Changelog by Remi Collet (2024-06-04):
- Fix filter bypass in filter_var FILTER_VALIDATE_URL
  CVE-2024-5458
php-common-7.2.34-22.el8.remi.aarch64 [640 KiB] Changelog by Remi Collet (2024-06-04):
- Fix filter bypass in filter_var FILTER_VALIDATE_URL
  CVE-2024-5458
php-common-7.2.34-21.el8.remi.aarch64 [640 KiB] Changelog by Remi Collet (2024-04-10):
- use oracle client library version 21.13 on x86_64, 19.19 on aarch64
- Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
- Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096

These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.
Health stats visible at Monitor.