Blog |
Support |
Repository |
Wizard
Jump to letter: [
ABCDGHIJLMNOPQRSTUVWXYZ
]
php56-php-oci8 - A module for PHP applications that use OCI8 databases
- Website:
- http://www.php.net/
- Licence:
- PHP
- Vendor:
- Remi's RPM repository <https://rpms.remirepo.net/> #StandWithUkraine
- Description:
The php56-php-oci8 packages provides the OCI8 extension version 2.0.12
and the PDO driver to access Oracle Database.
The extension is linked with Oracle client libraries 23.6
(Oracle Instant Client). For details, see Oracle's note
"Oracle Client / Server Interoperability Support" (ID 207303.1).
You must install libclntsh.so.23.1 to use this package,
provided by Oracle Instant Client RPM available from Oracle on:
https://www.oracle.com/database/technologies/instant-client/downloads.html
Documentation is at http://php.net/oci8 and http://php.net/pdo_oci
Packages
php56-php-oci8-5.6.40-44.el8.remi.x86_64
|
[117 KiB]
|
Changelog by Remi Collet (2024-11-26):
- Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface
GHSA-4w77-75f9-2c8w
- Fix OOB access in ldap_escape
CVE-2024-8932
- Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
CVE-2024-11234
- Fix Single byte overread with convert.quoted-printable-decode filter
CVE-2024-11233
|
php56-php-oci8-5.6.40-43.el8.remi.x86_64
|
[117 KiB]
|
Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
CVE-2024-8927
- Fix Erroneous parsing of multipart form data
CVE-2024-8925
|