Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Jul 2013 13:24:05 +0000 (UTC)
From:      Bryan Drewery <bdrewery@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r323445 - in head: security/vuxml www/suphp
Message-ID:  <201307221324.r6MDO59v074409@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: bdrewery
Date: Mon Jul 22 13:24:05 2013
New Revision: 323445
URL: http://svnweb.freebsd.org/changeset/ports/323445

Log:
  - Update suPHP to 0.7.2
  - Document possible privilege escalation
  
  Approved by:	maintainer timeout
  Security:	2fbfd455-f2d0-11e2-8a46-000d601460a4

Modified:
  head/security/vuxml/vuln.xml
  head/www/suphp/Makefile
  head/www/suphp/distinfo

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Jul 22 13:13:20 2013	(r323444)
+++ head/security/vuxml/vuln.xml	Mon Jul 22 13:24:05 2013	(r323445)
@@ -51,6 +51,42 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="2fbfd455-f2d0-11e2-8a46-000d601460a4">
+    <topic>suPHP -- Privilege escalation</topic>
+    <affects>
+      <package>
+	<name>suphp</name>
+	<range><lt>0.7.2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>suPHP developer Sebastian Marsching reports:</p>
+	<blockquote cite="https://lists.marsching.com/pipermail/suphp/2013-May/002552.html">;
+	  <p>When the suPHP_PHPPath was set, mod_suphp would use the specified PHP
+	    executable to pretty-print PHP source files (MIME type
+	    x-httpd-php-source or application/x-httpd-php-source).
+
+	    However, it would not sanitize the environment. Thus a user that was
+	    allowed to use the SetEnv directive in a .htaccess file (AllowOverride
+	    FileInfo) could make PHP load a malicious configuration file (e.g.
+	    loading malicious extensions).
+
+	    As the PHP process for highlighting the source file was run with the
+	    privileges of the user Apache HTTPd was running as, a local attacker
+	    could probably execute arbitrary code with the privileges of this user.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://lists.marsching.com/pipermail/suphp/2013-May/002552.html</url>;
+    </references>
+    <dates>
+      <discovery>2013-05-20</discovery>
+      <entry>2013-07-22</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="ca4d63fb-f15c-11e2-b183-20cf30e32f6d">
     <topic>apache24 -- several vulnerabilities</topic>
     <affects>

Modified: head/www/suphp/Makefile
==============================================================================
--- head/www/suphp/Makefile	Mon Jul 22 13:13:20 2013	(r323444)
+++ head/www/suphp/Makefile	Mon Jul 22 13:24:05 2013	(r323445)
@@ -2,8 +2,7 @@
 # $FreeBSD$
 
 PORTNAME=	suphp
-PORTVERSION=	0.7.1
-PORTREVISION=	5
+PORTVERSION=	0.7.2
 CATEGORIES=	www
 MASTER_SITES=	http://www.suphp.org/download/ \
 		${MASTER_SITE_LOCAL:S|%SUBDIR%|koitsu|}
@@ -12,7 +11,8 @@ MAINTAINER=	yzlin@FreeBSD.org
 COMMENT=	Securely execute PHP scripts under Apache
 
 GNU_CONFIGURE=	yes
-USE_AUTOTOOLS=	aclocal:env automake:env autoconf:env libtool:env
+USE_AUTOTOOLS=	aclocal:env automake autoconf:env libtool:env
+AUTOMAKE_ARGS+=	--add-missing
 
 # Maintainer has not tested suPHP 0.6.x on Apache 1.3.
 USE_APACHE=	22
@@ -39,11 +39,9 @@ CONFIGURE_ARGS+=	--with-apr=${LOCALBASE}
 AUTOTOOLSFILES=	aclocal.m4
 
 post-patch:
-	@${REINPLACE_CMD} -e 's|2.61|%%AUTOCONF_VERSION%%|g' \
-			  -e 's|1.10.1|%%AUTOMAKE_APIVER%%|g' \
-			  -e 's|1.10|%%AUTOMAKE_VERSION%%|g' \
+	@${REINPLACE_CMD} -e 's|2.68|%%AUTOCONF_VERSION%%|g' \
+			  -e 's|1.11.3|%%AUTOMAKE_VERSION%%|g' \
 			  ${WRKSRC}/aclocal.m4
-	@${CHMOD} 755 ${WRKSRC}/config/install-sh
 
 post-install:
 .if !defined(NOPORTDOCS)

Modified: head/www/suphp/distinfo
==============================================================================
--- head/www/suphp/distinfo	Mon Jul 22 13:13:20 2013	(r323444)
+++ head/www/suphp/distinfo	Mon Jul 22 13:24:05 2013	(r323445)
@@ -1,2 +1,2 @@
-SHA256 (suphp-0.7.1.tar.gz) = 91d180046f95f66c9ad12f3ca67bba87e2b64338543145e68370babc4434e58a
-SIZE (suphp-0.7.1.tar.gz) = 386521
+SHA256 (suphp-0.7.2.tar.gz) = e09d4d73a552f4a5bb46961ac7e7ea61c5c24757a8b80d8d770e4c7ed6519760
+SIZE (suphp-0.7.2.tar.gz) = 343223



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307221324.r6MDO59v074409>