[Secure-testing-commits] r5699 - in data: . patches/MOPB

Sean Finney seanius at alioth.debian.org
Sun Apr 22 13:02:49 UTC 2007


Author: seanius
Date: 2007-04-22 13:02:48 +0000 (Sun, 22 Apr 2007)
New Revision: 5699

Added:
   data/patches/MOPB/MOPB-35-php4.diff
Modified:
   data/mopb.txt
Log:
fix for mopb 35

Modified: data/mopb.txt
===================================================================
--- data/mopb.txt	2007-04-22 12:40:30 UTC (rev 5698)
+++ data/mopb.txt	2007-04-22 13:02:48 UTC (rev 5699)
@@ -1,7 +1,7 @@
 Issues affecting PHP 4 and PHP 5:
 
 41  PHP 5 sqlite_udf_decode_binary() Buffer Overflow Vulnerability
-#TODO(medium) -> for PHP5, not activated in the PHP4 build, CVE-2007-1887. (php4 & php5, remote code execution)
+#TODO(medium) -> for PHP5, php4 uses a seperate php4-sqlite package.
 [MOPB-41-php5.diff]
 
 34  PHP mail() Header Injection Through Subject and To Parameters
@@ -32,6 +32,7 @@
 
 35  PHP 4 zip_entry_read() Integer Overflow Vulnerability
 #TODO(medium) -> needs to be fixed, CVE-2007-1777 (php4, remote code execution)
+[MOPB-35-php4.diff]
 
 32  PHP 4.4.5/4.4.6 session_decode() Double Free Vulnerability (U) 
 TODO(medium) -> needs to be fixed in php/etch, sarge not affected (php4 4.4.5/4.4.6, remote code execution)
@@ -177,7 +178,7 @@
 
    Sarge Etch
 41   ?    x
-35   ?    x
+35   ?    a
 34   /    t
 32   a    T 
 30        n

Added: data/patches/MOPB/MOPB-35-php4.diff
===================================================================
--- data/patches/MOPB/MOPB-35-php4.diff	2007-04-22 12:40:30 UTC (rev 5698)
+++ data/patches/MOPB/MOPB-35-php4.diff	2007-04-22 13:02:48 UTC (rev 5699)
@@ -0,0 +1,31 @@
+--- zip.c	2007/01/01 09:46:50	1.33.2.3.2.2
++++ zip.c	2007/01/02 14:40:32	1.33.2.3.2.3
+@@ -16,7 +16,7 @@
+    +----------------------------------------------------------------------+
+  */
+ 
+-/* $Id: zip.c,v 1.33.2.3.2.2 2007/01/01 09:46:50 sebastian Exp $ */
++/* $Id: zip.c,v 1.33.2.3.2.3 2007/01/02 14:40:32 iliaa Exp $ */
+ 
+ #ifdef HAVE_CONFIG_H
+ #include "config.h"
+@@ -283,7 +283,7 @@
+ }
+ /* }}} */
+ 
+-/* {{{ proto string zip_entry_read(resource zip_ent)
++/* {{{ proto string zip_entry_read(resource zip_ent [, int nbytes])
+    Read X bytes from an opened zip entry */
+ PHP_FUNCTION(zip_entry_read)
+ {
+@@ -295,6 +295,10 @@
+ 
+ 	if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "r|l", &zzip_ent, &len) == FAILURE) {
+ 		return;
++	}
++	if (len <= 0) {
++		php_error_docref(NULL TSRMLS_CC, E_WARNING, "The bytes parameter must greater then zero");
++		RETURN_FALSE;
+ 	}
+ 	ZEND_FETCH_RESOURCE(entry, php_zzip_dirent *, &zzip_ent, -1, le_zip_entry_name, le_zip_entry);
+ 




More information about the Secure-testing-commits mailing list