Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Feb 2015 22:36:50 +0000 (UTC)
From:      Florian Smeets <flo@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r379853 - in head/lang/php53: . files
Message-ID:  <201502242236.t1OMaoAx078913@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: flo
Date: Tue Feb 24 22:36:49 2015
New Revision: 379853
URL: https://svnweb.freebsd.org/changeset/ports/379853
QAT: https://qat.redports.org/buildarchive/r379853/

Log:
  Add patches for
  - CVE-2014-8142
  - CVE-2015-0231
  
  MFH:		2015Q1

Added:
  head/lang/php53/files/patch-CVE-2014-8142.patch   (contents, props changed)
  head/lang/php53/files/patch-CVE-2015-0231.patch   (contents, props changed)
Modified:
  head/lang/php53/Makefile

Modified: head/lang/php53/Makefile
==============================================================================
--- head/lang/php53/Makefile	Tue Feb 24 22:08:04 2015	(r379852)
+++ head/lang/php53/Makefile	Tue Feb 24 22:36:49 2015	(r379853)
@@ -3,7 +3,7 @@
 
 PORTNAME=	php53
 PORTVERSION=	5.3.29
-PORTREVISION?=	3
+PORTREVISION?=	4
 CATEGORIES?=	lang devel www
 MASTER_SITES=	${MASTER_SITE_PHP}
 MASTER_SITE_SUBDIR=	distributions

Added: head/lang/php53/files/patch-CVE-2014-8142.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/lang/php53/files/patch-CVE-2014-8142.patch	Tue Feb 24 22:36:49 2015	(r379853)
@@ -0,0 +1,56 @@
+Index: ext/standard/tests/serialize/bug68594.phpt
+===================================================================
+--- /dev/null	1970-01-01 00:00:00.000000000 +0000
++++ ext/standard/tests/serialize/bug68594.phpt	2015-02-13 11:27:34.753347966 -0500
+@@ -0,0 +1,23 @@
++--TEST--
++Bug #68545 Use after free vulnerability in unserialize()
++--FILE--
++<?php
++for ($i=4; $i<100; $i++) {
++	$m = new StdClass();
++
++	$u = array(1);
++
++	$m->aaa = array(1,2,&$u,4,5);
++	$m->bbb = 1;
++	$m->ccc = &$u;
++	$m->ddd = str_repeat("A", $i);
++
++	$z = serialize($m);
++	$z = str_replace("bbb", "aaa", $z);
++	$y = unserialize($z);
++	$z = serialize($y);
++}
++?>
++===DONE===
++--EXPECTF--
++===DONE===
+Index: ext/standard/var_unserializer.c
+===================================================================
+--- ext/standard/var_unserializer.c	2015-02-13 11:27:34.793348294 -0500
++++ ext/standard/var_unserializer.c	2015-02-13 11:27:34.753347966 -0500
+@@ -298,6 +298,9 @@
+ 		} else {
+ 			/* object properties should include no integers */
+ 			convert_to_string(key);
++			if (zend_symtable_find(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, (void **)&old_data)==SUCCESS) {
++				var_push_dtor(var_hash, old_data);
++			}
+ 			zend_hash_update(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, &data,
+ 					sizeof data, NULL);
+ 		}
+Index: ext/standard/var_unserializer.re
+===================================================================
+--- ext/standard/var_unserializer.re	2015-02-13 11:27:34.793348294 -0500
++++ ext/standard/var_unserializer.re	2015-02-13 11:27:34.753347966 -0500
+@@ -304,6 +304,9 @@
+ 		} else {
+ 			/* object properties should include no integers */
+ 			convert_to_string(key);
++			if (zend_symtable_find(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, (void **)&old_data)==SUCCESS) {
++				var_push_dtor(var_hash, old_data);
++			}
+ 			zend_hash_update(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, &data,
+ 					sizeof data, NULL);
+ 		}

Added: head/lang/php53/files/patch-CVE-2015-0231.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/lang/php53/files/patch-CVE-2015-0231.patch	Tue Feb 24 22:36:49 2015	(r379853)
@@ -0,0 +1,56 @@
+Index: ext/standard/tests/strings/bug68710.phpt
+===================================================================
+--- /dev/null	1970-01-01 00:00:00.000000000 +0000
++++ ext/standard/tests/strings/bug68710.phpt	2015-02-13 11:36:32.969760122 -0500
+@@ -0,0 +1,25 @@
++--TEST--
++Bug #68710 Use after free vulnerability in unserialize() (bypassing the
++CVE-2014-8142 fix)
++--FILE--
++<?php
++for ($i=4; $i<100; $i++) {
++    $m = new StdClass();
++
++    $u = array(1);
++
++    $m->aaa = array(1,2,&$u,4,5);
++    $m->bbb = 1;
++    $m->ccc = &$u;
++    $m->ddd = str_repeat("A", $i);
++
++    $z = serialize($m);
++    $z = str_replace("aaa", "123", $z);
++    $z = str_replace("bbb", "123", $z);
++    $y = unserialize($z);
++    $z = serialize($y);
++}
++?>
++===DONE===
++--EXPECTF--
++===DONE===
+Index: ext/standard/var_unserializer.c
+===================================================================
+--- ext/standard/var_unserializer.c	2015-02-13 11:36:33.009760449 -0500
++++ ext/standard/var_unserializer.c	2015-02-13 11:36:32.969760122 -0500
+@@ -298,7 +298,7 @@
+ 		} else {
+ 			/* object properties should include no integers */
+ 			convert_to_string(key);
+-			if (zend_symtable_find(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, (void **)&old_data)==SUCCESS) {
++			if (zend_hash_find(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, (void **)&old_data)==SUCCESS) {
+ 				var_push_dtor(var_hash, old_data);
+ 			}
+ 			zend_hash_update(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, &data,
+Index: ext/standard/var_unserializer.re
+===================================================================
+--- ext/standard/var_unserializer.re	2015-02-13 11:36:33.009760449 -0500
++++ ext/standard/var_unserializer.re	2015-02-13 11:36:32.969760122 -0500
+@@ -304,7 +304,7 @@
+ 		} else {
+ 			/* object properties should include no integers */
+ 			convert_to_string(key);
+-			if (zend_symtable_find(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, (void **)&old_data)==SUCCESS) {
++			if (zend_hash_find(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, (void **)&old_data)==SUCCESS) {
+ 				var_push_dtor(var_hash, old_data);
+ 			}
+ 			zend_hash_update(ht, Z_STRVAL_P(key), Z_STRLEN_P(key) + 1, &data,



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502242236.t1OMaoAx078913>