Blog |
Forum |
Repository
Jump to letter: [
ACFGHILMOPQRSTWXZ
]
php54-php-oci8 - A module for PHP applications that use OCI8 databases
- Website:
- http://www.php.net/
- Licence:
- PHP
- Vendor:
- Remi Collet
- Description:
The php54-php-oci8 packages provides the OCI8 extension version 1.4.9
and the PDO driver to access Oracle Database.
The extension is linked with Oracle client libraries 12.1
(Oracle Instant Client). For details, see Oracle's note
"Oracle Client / Server Interoperability Support" (ID 207303.1).
You must install libclntsh.so.12.1 to use this package, provided
in the database installation, or in the free Oracle Instant Client
available from Oracle.
Notice:
- php54-php-oci8 provides oci8 and pdo_oci extensions from php sources.
- php54-php-pecl-oci8 only provides oci8 extension.
Documentation is at http://php.net/oci8 and http://php.net/pdo_oci
Packages
php54-php-oci8-5.4.45-12.fc21.remi.x86_64
|
[110 KiB]
|
Changelog by Remi Collet (2016-09-19):
- fix #72627: Memory Leakage In exif_process_IFD_in_TIFF
CVE-2016-7128
- fix #72926: Uninitialized Thumbail Data Leads To Memory Leakage
in exif_process_IFD_in_TIFF
- fix #73035: Out of bound when verify signature of tar phar
- fix #72928: Out of bound when verify signature of zip phar
CVE-2016-7414
- fix #72735 regression in exif maker note parser
|
php54-php-oci8-5.4.45-11.fc21.remi.x86_64
|
[109 KiB]
|
Changelog by Remi Collet (2016-07-22):
- Fix #70480: php_url_parse_ex() buffer overflow read
- Fix #69975: PHP segfaults when accessing nvarchar(max) defined columns
- Fix #72479: Use After Free Vulnerability in SNMP with GC and unserialize()
- Fix #72573: HTTP_PROXY is improperly trusted by some PHP libraries
CVE-2016-5385
- Fix #72513: buffer overflow vulnerability in virtual_file_ex
- Fix #72520: buffer overflow vulnerability in php_stream_zip_opener
- Fix #72533: locale_accept_from_http out-of-bounds access
- Fix #72562: Use After Free in unserialize() with Unexpected Session
Deserialization
- Fix #72603: Out of bound read in exif_process_IFD_in_MAKERNOTE
- Fix #72606: heap-buffer-overflow (write) simplestring_addn simplestring.c
- Partial fix #72613: do not treat negative returns from bz2 as size_t
- Fix #72618: NULL Pointer Dereference in exif_process_user_comment
- Fix #72519: possible OOB using imagegif
|