pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/www/php4 Update to 4.4.7
details: https://anonhg.NetBSD.org/pkgsrc/rev/d2554e086ac5
branches: trunk
changeset: 528531:d2554e086ac5
user: adrianp <adrianp%pkgsrc.org@localhost>
date: Sun May 06 19:50:18 2007 +0000
description:
Update to 4.4.7
* Fixed CVE-2007-1001, GD wbmp used with invalid image size (by Ivan Fratric)
* Fixed asciiz byte truncation inside mail() (MOPB-33 by Stefan Esser)
* Fixed a bug in mb_parse_str() that can be used to activate register_globals
(MOPB-26 by Stefan Esser)
* Fixed unallocated memory access/double free in in array_user_key_compare()
(MOPB-24 by Stefan Esser)
* Fixed a double free inside session_regenerate_id() (MOPB-22 by Stefan Esser)
* Added missing open_basedir & safe_mode checks to zip:// and bzip:// wrappers.
(MOPB-21 by Stefan Esser).
* Limit nesting level of input variables with max_input_nesting_level as fix for
(MOPB-03 by Stefan Esser)
* Fixed CRLF injection inside ftp_putcmd(). (by loveshell[at]Bug.Center.Team)
* Fixed a possible super-global overwrite inside import_request_variables().
(by Stefano Di Paola, Stefan Esser)
* Fixed a remotely trigger-able buffer overflow inside bundled libxmlrpc
library. (by Stanislav Malyshev)
* XSS in phpinfo() (MOPB-8 by Stefan Esser)
diffstat:
www/php4/Makefile | 3 +--
www/php4/Makefile.common | 4 ++--
www/php4/distinfo | 9 ++++-----
www/php4/patches/patch-ae | 38 --------------------------------------
4 files changed, 7 insertions(+), 47 deletions(-)
diffs (93 lines):
diff -r c6124ede1a89 -r d2554e086ac5 www/php4/Makefile
--- a/www/php4/Makefile Sun May 06 17:50:21 2007 +0000
+++ b/www/php4/Makefile Sun May 06 19:50:18 2007 +0000
@@ -1,7 +1,6 @@
-# $NetBSD: Makefile,v 1.76 2007/05/05 21:35:05 adrianp Exp $
+# $NetBSD: Makefile,v 1.77 2007/05/06 19:50:18 adrianp Exp $
PKGNAME= php-${PHP_BASE_VERS}
-PKGREVISION= 1
CATEGORIES+= lang
COMMENT= HTML-embedded scripting language
diff -r c6124ede1a89 -r d2554e086ac5 www/php4/Makefile.common
--- a/www/php4/Makefile.common Sun May 06 17:50:21 2007 +0000
+++ b/www/php4/Makefile.common Sun May 06 19:50:18 2007 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile.common,v 1.55 2007/03/03 13:19:52 adrianp Exp $
+# $NetBSD: Makefile.common,v 1.56 2007/05/06 19:50:18 adrianp Exp $
DISTNAME?= php-${PHP_DIST_VERS}
CATEGORIES+= www php4
@@ -18,7 +18,7 @@
# PHP_DIST_VERS version number on the php distfile
# PHP_BASE_VERS pkgsrc-mangled version number (convert pl -> .)
#
-PHP_DIST_VERS= 4.4.6
+PHP_DIST_VERS= 4.4.7
PHP_BASE_VERS= ${PHP_DIST_VERS}
DISTFILES?= ${PHP_DISTFILE}
diff -r c6124ede1a89 -r d2554e086ac5 www/php4/distinfo
--- a/www/php4/distinfo Sun May 06 17:50:21 2007 +0000
+++ b/www/php4/distinfo Sun May 06 19:50:18 2007 +0000
@@ -1,13 +1,12 @@
-$NetBSD: distinfo,v 1.64 2007/05/06 13:08:34 tron Exp $
+$NetBSD: distinfo,v 1.65 2007/05/06 19:50:18 adrianp Exp $
-SHA1 (php-4.4.6.tar.bz2) = e9c11ae084e2d505568d672afd06d4e6fc431621
-RMD160 (php-4.4.6.tar.bz2) = 16a81ee94d1f8f56adf3e76dde32c62597130674
-Size (php-4.4.6.tar.bz2) = 4559282 bytes
+SHA1 (php-4.4.7.tar.bz2) = a6e2d6b5c5aa4e82a718563dc8dbb4b83fc91b78
+RMD160 (php-4.4.7.tar.bz2) = 5eb44c4b7711111dcbc9117e21ad644e9e6562f3
+Size (php-4.4.7.tar.bz2) = 4543531 bytes
SHA1 (patch-aa) = feb064407950d0fc732b7240e65cac84420d2407
SHA1 (patch-ab) = 38a4bcd0d65b26c5d8e54e22b552f60831188469
SHA1 (patch-ac) = 28288b1e79c14fb2b40eaefed0d6d2bff4775607
SHA1 (patch-ad) = 9ca5d2f59bfeea77a98cd0e727546d11669114cd
-SHA1 (patch-ae) = 2a5989d3eb144a1c238703d388055d0f47624e1a
SHA1 (patch-ag) = 1ded1d7f4daac6806f41864c783f16d3403315e4
SHA1 (patch-ah) = 0ac37bd35c4594cb58f1ea85ef811154b644a931
SHA1 (patch-ai) = 0b9c1c9fb75a64026f2fb3cbd44cc19e0a1f186c
diff -r c6124ede1a89 -r d2554e086ac5 www/php4/patches/patch-ae
--- a/www/php4/patches/patch-ae Sun May 06 17:50:21 2007 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-$NetBSD: patch-ae,v 1.7 2007/05/06 13:08:34 tron Exp $
-
-Patch for CVE-2007-1001, taken from here:
-
-http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?r1=1.2.4.1&r2=1.2.4.1.8.1&view=patch
-
---- ext/gd/libgd/wbmp.c.orig 2003-04-25 01:59:03.000000000 +0100
-+++ ext/gd/libgd/wbmp.c 2007-05-06 13:47:23.000000000 +0100
-@@ -116,6 +116,15 @@
- if ((wbmp = (Wbmp *) gdMalloc (sizeof (Wbmp))) == NULL)
- return (NULL);
-
-+ if (overflow2(sizeof (int), width)) {
-+ gdFree(wbmp);
-+ return NULL;
-+ }
-+ if (overflow2(sizeof (int) * width, height)) {
-+ gdFree(wbmp);
-+ return NULL;
-+ }
-+
- if ((wbmp->bitmap = (int *) safe_emalloc(sizeof(int), (width * height), 0)) == NULL)
- {
- gdFree (wbmp);
-@@ -176,6 +185,13 @@
- printf ("W: %d, H: %d\n", wbmp->width, wbmp->height);
- #endif
-
-+ if (overflow2(sizeof (int), wbmp->width) ||
-+ overflow2(sizeof (int) * wbmp->width, wbmp->height))
-+ {
-+ gdFree(wbmp);
-+ return (-1);
-+ }
-+
- if ((wbmp->bitmap = (int *) safe_emalloc(sizeof(int), (wbmp->width * wbmp->height), 0)) == NULL)
- {
- gdFree (wbmp);
Home |
Main Index |
Thread Index |
Old Index