Blog |
Support |
Repository |
Wizard
Jump to letter: [
MP
]
php - PHP scripting language for creating dynamic web sites
- Website:
- http://www.php.net/
- Licence:
- PHP-3.01 AND Zend-2.0 AND BSD-2-Clause AND MIT AND Apache-1.0 AND NCSA AND BSL-1.0
- Vendor:
- Remi's RPM repository <https://rpms.remirepo.net/> #StandWithUkraine
- Description:
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts.
The php package contains the module (often referred to as mod_php)
which adds support for the PHP language to Apache HTTP Server.
Packages
php-8.4.0~rc4-1.el10.remi.x86_64
|
[1.9 MiB]
|
Changelog by Remi Collet (2024-11-05):
- Update to 8.4.0RC4
|
php-8.3.13-1.el10.remi.x86_64
|
[1.8 MiB]
|
Changelog by Remi Collet (2024-10-23):
- Update to 8.3.13 - http://www.php.net/releases/8_3_13.php
|
php-8.2.25-1.el10.remi.x86_64
|
[1.7 MiB]
|
Changelog by Remi Collet (2024-10-23):
- Update to 8.2.25 - http://www.php.net/releases/8_2_25.php
|
php-8.1.30-1.el10.remi.x86_64
|
[1.7 MiB]
|
Changelog by Remi Collet (2024-09-27):
- Update to 8.1.30 - http://www.php.net/releases/8_1_30.php
- use ICU 74.2
|
php-8.0.30-9.el10.remi.x86_64
|
[1.5 MiB]
|
Changelog by Remi Collet (2024-09-26):
- Fix Bypass of CVE-2012-1823, Argument Injection in PHP-CGI
CVE-2024-4577
- Fix Bypass of CVE-2024-4577, Parameter Injection Vulnerability
CVE-2024-8926
- Fix cgi.force_redirect configuration is bypassable due to the environment variable collision
CVE-2024-8927
- Fix Logs from childrens may be altered
CVE-2024-9026
- Fix Erroneous parsing of multipart form data
CVE-2024-8925
- use ICU 74.2
|
php-7.4.33-19.el10.remi.x86_64
|
[1.4 MiB]
|
Changelog by Remi Collet (2024-11-15):
- disable firebird on EL-10
|