Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 17 Nov 2012 17:49:06 GMT
From:      Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/173684: [update] lang/php52 to 5.2.17_12 (20121114)
Message-ID:  <201211171749.qAHHn6SM083009@red.freebsd.org>
Resent-Message-ID: <201211171750.qAHHo05r011878@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         173684
>Category:       ports
>Synopsis:       [update] lang/php52 to 5.2.17_12 (20121114)
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Sat Nov 17 17:50:00 UTC 2012
>Closed-Date:
>Last-Modified:
>Originator:     Svyatoslav Lempert
>Release:        9.1-PRERELEASE
>Organization:
>Environment:
>Description:
- Update backports patch to 20121114
- Bump PORTREVISION

Changes:
- CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function

Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions for strlen(filename) != filename_len

- CVE-2012-4388
The sapi_header_op function in main/SAPI.c does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, this vulnerability exists because of an incorrect fix for CVE-2011-1398.

- Timezone database updated to version 2012.9 (2012i)

Note:
I have no more wishes to support PHP 5.2.17 and strongly recommend updating to the latest vendor-supported version (php53/php5)
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

diff -Nru php52.old/Makefile php52/Makefile
--- php52.old/Makefile	2012-09-20 03:02:43.000000000 +0000
+++ php52/Makefile	2012-11-14 18:24:50.000000000 +0000
@@ -7,7 +7,7 @@
 
 PORTNAME=	php52
 PORTVERSION=	5.2.17
-PORTREVISION=	11
+PORTREVISION=	12
 CATEGORIES?=	lang devel www
 MASTER_SITES=	${MASTER_SITE_PHP}
 MASTER_SITE_SUBDIR=	distributions
@@ -26,7 +26,7 @@
 MAKE_JOBS_SAFE=	yes
 
 # BACKPORTS patch for lang/php52 and all php52-extensions
-PATCHFILES=	php52-backports-security-20120911.patch
+PATCHFILES=	php52-backports-security-20121114.patch
 PATCH_SITES+=	http://php52-backports.googlecode.com/files/
 
 .if !defined(PKGNAMESUFFIX)
diff -Nru php52.old/distinfo php52/distinfo
--- php52.old/distinfo	2012-09-20 03:02:43.000000000 +0000
+++ php52/distinfo	2012-11-14 18:26:51.000000000 +0000
@@ -1,7 +1,7 @@
 SHA256 (php-5.2.17.tar.bz2) = e81beb13ec242ab700e56f366e9da52fd6cf18961d155b23304ca870e53f116c
 SIZE (php-5.2.17.tar.bz2) = 9092312
-SHA256 (php52-backports-security-20120911.patch) = 4911e2a5abb72d0558b2baf07ff64ca054d71219bde183e41b591894fb7cb1f6
-SIZE (php52-backports-security-20120911.patch) = 356599
+SHA256 (php52-backports-security-20121114.patch) = 59dc139b9acf86bbb2e281696765de513c3bec7d43392a10b5f3b36a9881ab00
+SIZE (php52-backports-security-20121114.patch) = 410829
 SHA256 (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 354ce451417d14ef47761ae55147e9cee30fa0ff6f59447da021194c539f4d7f
 SIZE (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 43550
 SHA256 (suhosin-patch-5.2.16-0.9.7.patch.gz) = aae115a318d80b3f32cedf876e7a8e4b932febb1b0c743c0b398003ebe122f91


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211171749.qAHHn6SM083009>