From owner-svn-ports-all@FreeBSD.ORG Mon Nov 26 21:23:26 2012 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id F1B958AE; Mon, 26 Nov 2012 21:23:25 +0000 (UTC) (envelope-from flo@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id CCD828FC0C; Mon, 26 Nov 2012 21:23:25 +0000 (UTC) Received: from svn.freebsd.org (localhost [127.0.0.1]) by svn.freebsd.org (8.14.5/8.14.5) with ESMTP id qAQLNPE2078272; Mon, 26 Nov 2012 21:23:25 GMT (envelope-from flo@svn.freebsd.org) Received: (from flo@localhost) by svn.freebsd.org (8.14.5/8.14.5/Submit) id qAQLNP9A078268; Mon, 26 Nov 2012 21:23:25 GMT (envelope-from flo@svn.freebsd.org) Message-Id: <201211262123.qAQLNP9A078268@svn.freebsd.org> From: Florian Smeets Date: Mon, 26 Nov 2012 21:23:25 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r307800 - in branches/RELENG_9_1_0: lang/php52 security/vuxml X-SVN-Group: ports-branches MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Nov 2012 21:23:26 -0000 Author: flo Date: Mon Nov 26 21:23:25 2012 New Revision: 307800 URL: http://svnweb.freebsd.org/changeset/ports/307800 Log: MFH r307747 - Update backports patch to 20121114 - Bump PORTREVISION Changes: - CVE-2006-7243 PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions for strlen(filename) != filename_len - CVE-2012-4388 The sapi_header_op function in main/SAPI.c does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, this vulnerability exists because of an incorrect fix for CVE-2011-1398. - Timezone database updated to version 2012.9 (2012i) Approved by: portmgr (beat) Feature safe: yes Modified: branches/RELENG_9_1_0/lang/php52/Makefile (contents, props changed) branches/RELENG_9_1_0/lang/php52/distinfo (contents, props changed) branches/RELENG_9_1_0/security/vuxml/vuln.xml Directory Properties: branches/RELENG_9_1_0/ (props changed) Modified: branches/RELENG_9_1_0/lang/php52/Makefile ============================================================================== --- branches/RELENG_9_1_0/lang/php52/Makefile Mon Nov 26 21:15:46 2012 (r307799) +++ branches/RELENG_9_1_0/lang/php52/Makefile Mon Nov 26 21:23:25 2012 (r307800) @@ -7,7 +7,7 @@ PORTNAME= php52 PORTVERSION= 5.2.17 -PORTREVISION= 11 +PORTREVISION= 12 CATEGORIES?= lang devel www MASTER_SITES= ${MASTER_SITE_PHP} MASTER_SITE_SUBDIR= distributions @@ -26,7 +26,7 @@ USE_BZIP2= yes MAKE_JOBS_SAFE= yes # BACKPORTS patch for lang/php52 and all php52-extensions -PATCHFILES= php52-backports-security-20120911.patch +PATCHFILES= php52-backports-security-20121114.patch PATCH_SITES+= http://php52-backports.googlecode.com/files/ .if !defined(PKGNAMESUFFIX) Modified: branches/RELENG_9_1_0/lang/php52/distinfo ============================================================================== --- branches/RELENG_9_1_0/lang/php52/distinfo Mon Nov 26 21:15:46 2012 (r307799) +++ branches/RELENG_9_1_0/lang/php52/distinfo Mon Nov 26 21:23:25 2012 (r307800) @@ -1,7 +1,7 @@ SHA256 (php-5.2.17.tar.bz2) = e81beb13ec242ab700e56f366e9da52fd6cf18961d155b23304ca870e53f116c SIZE (php-5.2.17.tar.bz2) = 9092312 -SHA256 (php52-backports-security-20120911.patch) = 4911e2a5abb72d0558b2baf07ff64ca054d71219bde183e41b591894fb7cb1f6 -SIZE (php52-backports-security-20120911.patch) = 356599 +SHA256 (php52-backports-security-20121114.patch) = 59dc139b9acf86bbb2e281696765de513c3bec7d43392a10b5f3b36a9881ab00 +SIZE (php52-backports-security-20121114.patch) = 410829 SHA256 (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 354ce451417d14ef47761ae55147e9cee30fa0ff6f59447da021194c539f4d7f SIZE (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 43550 SHA256 (suhosin-patch-5.2.16-0.9.7.patch.gz) = aae115a318d80b3f32cedf876e7a8e4b932febb1b0c743c0b398003ebe122f91 Modified: branches/RELENG_9_1_0/security/vuxml/vuln.xml ============================================================================== --- branches/RELENG_9_1_0/security/vuxml/vuln.xml Mon Nov 26 21:15:46 2012 (r307799) +++ branches/RELENG_9_1_0/security/vuxml/vuln.xml Mon Nov 26 21:23:25 2012 (r307800) @@ -16660,7 +16660,7 @@ Note: Please add new entries to the beg php52 - 0 + 5.2.17_12 @@ -16679,11 +16679,6 @@ Note: Please add new entries to the beg

Paths with NULL in them (foo\0bar.txt) are now considered as invalid (CVE-2006-7243).

-
-

The php52 backports maintainer reports that this issue is unlikely - to be fixed in 5.2 due to design roadblocks. Users are strongly - encouraged to upgrade as soon as possible.

-
@@ -16694,7 +16689,7 @@ Note: Please add new entries to the beg 2010-12-10 2011-01-13 - 2012-09-19 + 2012-11-25