[packages/php/PHP_7_0] - hopefuly it's the same patch as adamg intended

arekm arekm at pld-linux.org
Fri Oct 25 14:29:12 CEST 2019


commit bbb6e53594778f2bcfe65384a074d5f6c349addc
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date:   Fri Oct 25 14:29:05 2019 +0200

    - hopefuly it's the same patch as adamg intended

 php-CVE-2019-11043.patch | 22 ++++++++++++++++++++++
 1 file changed, 22 insertions(+)
---
diff --git a/php-CVE-2019-11043.patch b/php-CVE-2019-11043.patch
new file mode 100644
index 0000000..a841677
--- /dev/null
+++ b/php-CVE-2019-11043.patch
@@ -0,0 +1,22 @@
+commit ab061f95ca966731b1c84cf5b7b20155c0a1c06a
+Author: Jakub Zelenka <bukka at php.net>
+Date:   Sat Oct 12 15:56:16 2019 +0100
+
+    Fix bug #78599 (env_path_info underflow can lead to RCE) (CVE-2019-11043)
+
+diff --git a/sapi/fpm/fpm/fpm_main.c b/sapi/fpm/fpm/fpm_main.c
+index 24a7e5d56a..50f92981f1 100644
+--- a/sapi/fpm/fpm/fpm_main.c
++++ b/sapi/fpm/fpm/fpm_main.c
+@@ -1209,8 +1209,8 @@ static void init_request_info(void)
+ 								path_info = script_path_translated + ptlen;
+ 								tflag = (slen != 0 && (!orig_path_info || strcmp(orig_path_info, path_info) != 0));
+ 							} else {
+-								path_info = env_path_info ? env_path_info + pilen - slen : NULL;
+-								tflag = (orig_path_info != path_info);
++								path_info = (env_path_info && pilen > slen) ? env_path_info + pilen - slen : NULL;
++								tflag = path_info && (orig_path_info != path_info);
+ 							}
+ 
+ 							if (tflag) {
+
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/php.git/commitdiff/bbb6e53594778f2bcfe65384a074d5f6c349addc



More information about the pld-cvs-commit mailing list