Blog |
Support |
Repository |
Wizard
Jump to letter: [
BCDGHIJLMOPQRSTUVWXYZ
]
php74-php-oci8 - A module for PHP applications that use OCI8 databases
- Website:
- http://www.php.net/
- Licence:
- PHP
- Vendor:
- Remi's RPM repository <https://rpms.remirepo.net/> #StandWithUkraine
- Description:
The php74-php-oci8 packages provides the OCI8 extension version 2.2.0
and the PDO driver to access Oracle Database.
The extension is linked with Oracle client libraries 23.6
(Oracle Instant Client). For details, see Oracle's note
"Oracle Client / Server Interoperability Support" (ID 207303.1).
You must install libclntsh.so.23.1 to use this package,
provided by Oracle Instant Client RPM available from Oracle on:
https://www.oracle.com/database/technologies/instant-client/downloads.html
Documentation is at http://php.net/oci8 and http://php.net/pdo_oci
Packages
php74-php-oci8-7.4.33-20.el8.remi.x86_64
|
[141 KiB]
|
Changelog by Remi Collet (2024-11-22):
- Fix Heap-Use-After-Free in sapi_read_post_data Processing in CLI SAPI Interface
GHSA-4w77-75f9-2c8w
- Fix OOB access in ldap_escape
CVE-2024-8932
- Fix Integer overflow in the dblib/firebird quoter causing OOB writes
CVE-2024-11236
- Fix Configuring a proxy in a stream context might allow for CRLF injection in URIs
CVE-2024-11234
- Fix Single byte overread with convert.quoted-printable-decode filter
CVE-2024-11233
|
php74-php-oci8-7.4.33-18.el8.remi.x86_64
|
[141 KiB]
|
Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
CVE-2024-8927
- Fix Logs from childrens may be altered
CVE-2024-9026
- Fix Erroneous parsing of multipart form data
CVE-2024-8925
- use ICU 74.2
|
These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.