The hardware and bandwidth for this mirror is donated by dogado GmbH, the Webhosting and Full Service-Cloud Provider. Check out our Wordpress Tutorial.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]dogado.de.

Remi's RPM repository - Packages

Blog | Support | Repository | Wizard

php-intl - Internationalization extension for PHP applications

Website:
http://www.php.net/
Licence:
PHP-3.01
Vendor:
Remi's RPM repository <https://rpms.remirepo.net/> #StandWithUkraine
Description:
The php-intl package contains a dynamic shared object that will add
support for using the ICU library to PHP.

Packages

php-intl-8.4.0~rc1-1.el8.remi.aarch64 [214 KiB] Changelog by Remi Collet (2024-09-24):
- Update to 8.4.0RC1
- bump ABI/API numbers
php-intl-8.3.12-1.el8.remi.aarch64 [207 KiB] Changelog by Remi Collet (2024-09-25):
- Update to 8.3.12 - http://www.php.net/releases/8_3_12.php
php-intl-8.3.11-1.el8.remi.aarch64 [206 KiB] Changelog by Remi Collet (2024-08-28):
- Update to 8.3.11 - http://www.php.net/releases/8_3_11.php
php-intl-8.2.24-1.el8.remi.aarch64 [205 KiB] Changelog by Remi Collet (2024-09-25):
- Update to 8.2.24 - http://www.php.net/releases/8_2_24.php
php-intl-8.2.23-1.el8.remi.aarch64 [204 KiB] Changelog by Remi Collet (2024-08-28):
- Update to 8.2.23 - http://www.php.net/releases/8_2_23.php
php-intl-8.1.29-1.el8.remi.aarch64 [187 KiB] Changelog by Remi Collet (2024-06-05):
- Update to 8.1.29 - http://www.php.net/releases/8_1_29.php
php-intl-8.1.28-1.el8.remi.aarch64 [187 KiB] Changelog by Remi Collet (2024-04-10):
- Update to 8.1.28 - http://www.php.net/releases/8_1_28.php
php-intl-8.0.30-9.el8.remi.aarch64 [184 KiB] Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
  CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
- Fix Logs from childrens may be altered
  CVE-2024-9026
- Fix Erroneous parsing of multipart form data
  CVE-2024-8925
- use ICU 74.2
php-intl-8.0.30-8.el8.remi.aarch64 [184 KiB] Changelog by Remi Collet (2024-07-31):
- add backport for https://bugs.php.net/79589
  error:14095126:SSL routines:ssl3_read_n:unexpected eof while reading
php-intl-7.4.33-18.el8.remi.aarch64 [184 KiB] Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
  CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
- Fix Logs from childrens may be altered
  CVE-2024-9026
- Fix Erroneous parsing of multipart form data
  CVE-2024-8925
- use ICU 74.2
php-intl-7.4.33-17.el8.remi.aarch64 [184 KiB] Changelog by Remi Collet (2024-08-26):
- add backport for https://bugs.php.net/79589
  error:14095126:SSL routines:ssl3_read_n:unexpected eof while reading
php-intl-7.3.33-16.el8.remi.aarch64 [181 KiB] Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
  CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
  CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
  CVE-2024-8927
- Fix Erroneous parsing of multipart form data
  CVE-2024-8925
php-intl-7.3.33-14.el8.remi.aarch64 [180 KiB] Changelog by Remi Collet (2024-06-04):
- Fix filter bypass in filter_var FILTER_VALIDATE_URL
  CVE-2024-5458
php-intl-7.2.34-22.el8.remi.aarch64 [178 KiB] Changelog by Remi Collet (2024-06-04):
- Fix filter bypass in filter_var FILTER_VALIDATE_URL
  CVE-2024-5458
php-intl-7.2.34-21.el8.remi.aarch64 [178 KiB] Changelog by Remi Collet (2024-04-10):
- use oracle client library version 21.13 on x86_64, 19.19 on aarch64
- Fix __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
  CVE-2024-2756
- Fix password_verify can erroneously return true opening ATO risk
  CVE-2024-3096

These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.
Health stats visible at Monitor.