[packages/php/PHP_5_3] - rel 50; backported fix for CVE-2019-11043
arekm
arekm at pld-linux.org
Fri Oct 25 14:11:30 CEST 2019
commit d03d1017b484b4496358c51d89fb2409a7156823
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date: Fri Oct 25 14:11:23 2019 +0200
- rel 50; backported fix for CVE-2019-11043
CVE-2019-11043.patch | 22 ++++++++++++++++++++++
php.spec | 4 +++-
2 files changed, 25 insertions(+), 1 deletion(-)
---
diff --git a/php.spec b/php.spec
index b331731..cdbc6b8 100644
--- a/php.spec
+++ b/php.spec
@@ -143,7 +143,7 @@ ERROR: You need to select at least one Apache SAPI to build shared modules.
%undefine with_alternatives
%endif
-%define rel 49
+%define rel 50
%define orgname php
%define ver_suffix 53
%define php_suffix %{!?with_default_php:%{ver_suffix}}
@@ -255,6 +255,7 @@ Patch77: php-icu64.patch
# https://repo.webtatic.com/yum/centos/5/SRPMS/repoview/php.html
# also from RHEL6/CentOS7
Patch220: php-5.3.3-CVE-2011-4153.patch
+Patch221: CVE-2019-11043.patch
Patch247: php-5.3.3-CVE-2014-2497.patch
@@ -2153,6 +2154,7 @@ gzip -dc %{SOURCE15} | tar xf - -C sapi/
%patch77 -p1
%patch220 -p1
+%patch221 -p1
%patch247 -p1
diff --git a/CVE-2019-11043.patch b/CVE-2019-11043.patch
new file mode 100644
index 0000000..a841677
--- /dev/null
+++ b/CVE-2019-11043.patch
@@ -0,0 +1,22 @@
+commit ab061f95ca966731b1c84cf5b7b20155c0a1c06a
+Author: Jakub Zelenka <bukka at php.net>
+Date: Sat Oct 12 15:56:16 2019 +0100
+
+ Fix bug #78599 (env_path_info underflow can lead to RCE) (CVE-2019-11043)
+
+diff --git a/sapi/fpm/fpm/fpm_main.c b/sapi/fpm/fpm/fpm_main.c
+index 24a7e5d56a..50f92981f1 100644
+--- a/sapi/fpm/fpm/fpm_main.c
++++ b/sapi/fpm/fpm/fpm_main.c
+@@ -1209,8 +1209,8 @@ static void init_request_info(void)
+ path_info = script_path_translated + ptlen;
+ tflag = (slen != 0 && (!orig_path_info || strcmp(orig_path_info, path_info) != 0));
+ } else {
+- path_info = env_path_info ? env_path_info + pilen - slen : NULL;
+- tflag = (orig_path_info != path_info);
++ path_info = (env_path_info && pilen > slen) ? env_path_info + pilen - slen : NULL;
++ tflag = path_info && (orig_path_info != path_info);
+ }
+
+ if (tflag) {
+
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/php.git/commitdiff/d03d1017b484b4496358c51d89fb2409a7156823
More information about the pld-cvs-commit
mailing list