[Pkg-php-commits] r1001 - in php5/branches/etch/debian: . patches

Sean Finney seanius at alioth.debian.org
Thu Feb 21 05:31:20 UTC 2008


Author: seanius
Date: 2008-02-21 05:31:20 +0000 (Thu, 21 Feb 2008)
New Revision: 1001

Added:
   php5/branches/etch/debian/patches/131-build-fix.patch
Removed:
   php5/branches/etch/debian/patches/128-CVE-2007-4659.patch
Modified:
   php5/branches/etch/debian/changelog
Log:
sync with latest security update

Modified: php5/branches/etch/debian/changelog
===================================================================
--- php5/branches/etch/debian/changelog	2008-02-21 01:23:32 UTC (rev 1000)
+++ php5/branches/etch/debian/changelog	2008-02-21 05:31:20 UTC (rev 1001)
@@ -1,13 +1,19 @@
-php5 (5.2.0-8+etch9) UNRELEASED; urgency=low
+php5 (5.2.0-8+etch10) stable-security; urgency=high
 
-  * NOT RELEASED YET
-  * NMU prepared for the security team by the package maintainer.
-  * The following security issues are addressed with this update:
-    - CVE-2007-5898: partial multibyte sequences in htmlentities etc
-    - CVE-2007-5899: output_add_rewrite_var and non-local URL's
+  * Drop the patch for CVE-2007-4659 for now, since it causes
+    regressions in some environments.
 
- -- sean finney <seanius at debian.org>  Sun, 02 Dec 2007 14:26:36 +0100
+ -- Moritz Muehlenhoff <jmm at debian.org>  Fri, 18 Jan 2008 17:34:37 +0100
 
+php5 (5.2.0-8+etch9) stable-security; urgency=high
+
+  * Fix previous patch / compilation on 64 bit archs
+  * Add more patches by Sean from SVN:
+    - CVE-2007-5898: Fix insecure handling of htmlentities() and htmlspecialchars()
+    - CVE-2007-5899: Fix information leak in output_add_rewrite_var()
+
+ -- Moritz Muehlenhoff <jmm at debian.org>  Wed, 26 Dec 2007 15:50:55 +0000
+
 php5 (5.2.0-8+etch8) stable-security; urgency=low
 
   * NMU prepared for the security team by the package maintainer.

Deleted: php5/branches/etch/debian/patches/128-CVE-2007-4659.patch
===================================================================
--- php5/branches/etch/debian/patches/128-CVE-2007-4659.patch	2008-02-21 01:23:32 UTC (rev 1000)
+++ php5/branches/etch/debian/patches/128-CVE-2007-4659.patch	2008-02-21 05:31:20 UTC (rev 1001)
@@ -1,64 +0,0 @@
---- old/Zend/zend_ini.c	2007/04/16 08:09:54	1.39.2.2.2.8
-+++ new/Zend/zend_ini.c	2007/06/17 14:31:12	1.39.2.2.2.10
-@@ -55,7 +55,9 @@
- 				ini_entry->on_modify(ini_entry, ini_entry->orig_value, ini_entry->orig_value_length, ini_entry->mh_arg1, ini_entry->mh_arg2, ini_entry->mh_arg3, stage TSRMLS_CC);
- 			} zend_end_try();
- 		}
--		efree(ini_entry->value);
-+		if (ini_entry->value != ini_entry->orig_value) {
-+			efree(ini_entry->value);
-+		}
- 		ini_entry->value = ini_entry->orig_value;
- 		ini_entry->value_length = ini_entry->orig_value_length;
- 		ini_entry->modified = 0;
-@@ -234,30 +236,39 @@
- {
- 	zend_ini_entry *ini_entry;
- 	char *duplicate;
-+	zend_bool modified;
- 	TSRMLS_FETCH();
- 
- 	if (zend_hash_find(EG(ini_directives), name, name_length, (void **) &ini_entry)==FAILURE) {
- 		return FAILURE;
- 	}
- 
-+	if (stage == ZEND_INI_STAGE_ACTIVATE && modify_type == ZEND_INI_SYSTEM) {
-+		ini_entry->modifiable = ZEND_INI_SYSTEM;
-+	}
-+
- 	if (!(ini_entry->modifiable & modify_type)) {
- 		return FAILURE;
- 	}
- 
-+	modified = ini_entry->modified;
-+
-+	if (!EG(modified_ini_directives)) {
-+		ALLOC_HASHTABLE(EG(modified_ini_directives));
-+		zend_hash_init(EG(modified_ini_directives), 8, NULL, NULL, 0);
-+	}
-+	if (!modified) {
-+		ini_entry->orig_value = ini_entry->value;
-+		ini_entry->orig_value_length = ini_entry->value_length;
-+		ini_entry->modified = 1;
-+		zend_hash_add(EG(modified_ini_directives), name, name_length, &ini_entry, sizeof(zend_ini_entry*), NULL);
-+	}
-+
- 	duplicate = estrndup(new_value, new_value_length);
--	
-+
- 	if (!ini_entry->on_modify
- 		|| ini_entry->on_modify(ini_entry, duplicate, new_value_length, ini_entry->mh_arg1, ini_entry->mh_arg2, ini_entry->mh_arg3, stage TSRMLS_CC)==SUCCESS) {
--		if (!ini_entry->modified) {
--			ini_entry->orig_value = ini_entry->value;
--			ini_entry->orig_value_length = ini_entry->value_length;
--			ini_entry->modified = 1;
--			if (!EG(modified_ini_directives)) {
--				ALLOC_HASHTABLE(EG(modified_ini_directives));
--				zend_hash_init(EG(modified_ini_directives), 8, NULL, NULL, 0);
--			}
--			zend_hash_add(EG(modified_ini_directives), name, name_length, &ini_entry, sizeof(zend_ini_entry*), NULL);
--		} else { /* we already changed the value, free the changed value */
-+		if (modified && ini_entry->orig_value != ini_entry->value) { /* we already changed the value, free the changed value */
- 			efree(ini_entry->value);
- 		}
- 		ini_entry->value = duplicate;

Added: php5/branches/etch/debian/patches/131-build-fix.patch
===================================================================
--- php5/branches/etch/debian/patches/131-build-fix.patch	                        (rev 0)
+++ php5/branches/etch/debian/patches/131-build-fix.patch	2008-02-21 05:31:20 UTC (rev 1001)
@@ -0,0 +1,10 @@
+--- php5-5.2.0/ext/session/session.c.orig	2007-12-29 02:23:37.000000000 +0000
++++ php5-5.2.0/ext/session/session.c	2007-12-29 02:24:44.000000000 +0000
+@@ -46,6 +46,7 @@
+ #include "ext/standard/php_rand.h"                   /* for RAND_MAX */
+ #include "ext/standard/info.h"
+ #include "ext/standard/php_smart_str.h"
++#include "ext/standard/url.h"
+ 
+ #include "mod_files.h"
+ #include "mod_user.h"




More information about the Pkg-php-commits mailing list