pkgsrc-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
pkg/33230: PHP-4.4.2 patch available
>Number: 33230
>Category: pkg
>Synopsis: Patch for the information exposure vulnerability in php-4.4.2
>available (1803)
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: pkg-manager
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Mon Apr 10 12:15:00 +0000 2006
>Originator: Tonnerre Lombard
>Release: NetBSD 2.1
>Organization:
SyGroup GmbH
>Environment:
System: NetBSD thebsh.sygroup-int.ch 2.1 NetBSD 2.1 (GENERIC.MP) #0: Mon Oct 24
19:21:50 UTC 2005
jmc%faith.netbsd.org@localhost:/home/builds/ab/netbsd-2-1-RELEASE/alpha/200510241747Z-obj/home/builds/ab/netbsd-2-1-RELEASE/src/sys/arch/alpha/compile/GENERIC.MP
alpha
Architecture: alpha
Machine: alpha
>Description:
PHP 4.4.2 has a nice feature of remote memory reading. According to
the PHP people, this patch removes the feature for people who don't
want it.
>How-To-Repeat:
http://hostname/index.php?foo=AAAAAAAAAAAAAAAAAAA<lots of them>AAAA
>Fix:
--- html.c 2006/01/01 13:09:55 1.112
+++ html.c 2006/02/25 21:30:32 1.113
@@ -18,7 +18,7 @@
+----------------------------------------------------------------------+
*/
-/* $Id: html.c,v 1.112 2006/01/01 13:09:55 sniper Exp $ */
+/* $Id: html.c,v 1.113 2006/02/25 21:30:32 rasmus Exp $ */
/*
* HTML entity resources:
@@ -884,7 +884,7 @@
unsigned char replacement[15];
int replacement_len;
- ret = estrdup(old);
+ ret = estrndup(old, oldlen);
retlen = oldlen;
if (!retlen) {
goto empty_source;
Home |
Main Index |
Thread Index |
Old Index