Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 Nov 2012 15:42:23 +0000 (UTC)
From:      Florian Smeets <flo@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r307747 - in head: lang/php52 security/vuxml
Message-ID:  <201211251542.qAPFgNvZ084954@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: flo
Date: Sun Nov 25 15:42:22 2012
New Revision: 307747
URL: http://svnweb.freebsd.org/changeset/ports/307747

Log:
  - Update backports patch to 20121114
  - Bump PORTREVISION
  
  Changes:
  - CVE-2006-7243
  PHP before 5.3.4 accepts the \0 character in a pathname, which might allow
  context-dependent attackers to bypass intended access restrictions by placing a
  safe file extension after this character, as demonstrated by .php\0.jpg at the
  end of the argument to the file_exists function
  
  Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions
  for strlen(filename) != filename_len
  
  - CVE-2012-4388
  The sapi_header_op function in main/SAPI.c does not properly determine a pointer
  during checks for %0D sequences (aka carriage return characters), which allows
  remote attackers to bypass an HTTP response-splitting protection mechanism via a
  crafted URL, this vulnerability exists because of an incorrect fix for
  CVE-2011-1398.
  
  - Timezone database updated to version 2012.9 (2012i)
  
  PR:		ports/173685
  Submitted by:	Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
  Approved by:	maintainer
  Feature safe:	yes

Modified:
  head/lang/php52/Makefile   (contents, props changed)
  head/lang/php52/distinfo   (contents, props changed)
  head/security/vuxml/vuln.xml

Modified: head/lang/php52/Makefile
==============================================================================
--- head/lang/php52/Makefile	Sun Nov 25 14:40:02 2012	(r307746)
+++ head/lang/php52/Makefile	Sun Nov 25 15:42:22 2012	(r307747)
@@ -7,7 +7,7 @@
 
 PORTNAME=	php52
 PORTVERSION=	5.2.17
-PORTREVISION=	11
+PORTREVISION=	12
 CATEGORIES?=	lang devel www
 MASTER_SITES=	${MASTER_SITE_PHP}
 MASTER_SITE_SUBDIR=	distributions
@@ -26,7 +26,7 @@ USE_BZIP2=	yes
 MAKE_JOBS_SAFE=	yes
 
 # BACKPORTS patch for lang/php52 and all php52-extensions
-PATCHFILES=	php52-backports-security-20120911.patch
+PATCHFILES=	php52-backports-security-20121114.patch
 PATCH_SITES+=	http://php52-backports.googlecode.com/files/
 
 .if !defined(PKGNAMESUFFIX)

Modified: head/lang/php52/distinfo
==============================================================================
--- head/lang/php52/distinfo	Sun Nov 25 14:40:02 2012	(r307746)
+++ head/lang/php52/distinfo	Sun Nov 25 15:42:22 2012	(r307747)
@@ -1,7 +1,7 @@
 SHA256 (php-5.2.17.tar.bz2) = e81beb13ec242ab700e56f366e9da52fd6cf18961d155b23304ca870e53f116c
 SIZE (php-5.2.17.tar.bz2) = 9092312
-SHA256 (php52-backports-security-20120911.patch) = 4911e2a5abb72d0558b2baf07ff64ca054d71219bde183e41b591894fb7cb1f6
-SIZE (php52-backports-security-20120911.patch) = 356599
+SHA256 (php52-backports-security-20121114.patch) = 59dc139b9acf86bbb2e281696765de513c3bec7d43392a10b5f3b36a9881ab00
+SIZE (php52-backports-security-20121114.patch) = 410829
 SHA256 (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 354ce451417d14ef47761ae55147e9cee30fa0ff6f59447da021194c539f4d7f
 SIZE (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 43550
 SHA256 (suhosin-patch-5.2.16-0.9.7.patch.gz) = aae115a318d80b3f32cedf876e7a8e4b932febb1b0c743c0b398003ebe122f91

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Nov 25 14:40:02 2012	(r307746)
+++ head/security/vuxml/vuln.xml	Sun Nov 25 15:42:22 2012	(r307747)
@@ -16626,7 +16626,7 @@ Note:  Please add new entries to the beg
       </package>
       <package>
 	<name>php52</name>
-	<range><ge>0</ge></range>
+	<range><lt>5.2.17_12</lt></range>
       </package>
     </affects>
     <description>
@@ -16645,11 +16645,6 @@ Note:  Please add new entries to the beg
 	  <p>Paths with NULL in them (foo\0bar.txt) are now considered
 	    as invalid (CVE-2006-7243).</p>
 	</blockquote>
-	<blockquote cite="http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/171583">;
-	  <p>The php52 backports maintainer reports that this issue is unlikely
-	    to be fixed in 5.2 due to design roadblocks. Users are strongly
-	    encouraged to upgrade as soon as possible.</p>
-	</blockquote>
       </body>
     </description>
     <references>
@@ -16660,7 +16655,7 @@ Note:  Please add new entries to the beg
     <dates>
       <discovery>2010-12-10</discovery>
       <entry>2011-01-13</entry>
-      <modified>2012-09-19</modified>
+      <modified>2012-11-25</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211251542.qAPFgNvZ084954>