SOURCES: php-CVE-2006-1490.patch (NEW) - new - binary safeness in ...

adamg adamg at pld-linux.org
Wed Apr 19 18:42:06 CEST 2006


Author: adamg                        Date: Wed Apr 19 16:42:06 2006 GMT
Module: SOURCES                       Tag: HEAD
---- Log message:
- new - binary safeness in html_decode()

---- Files affected:
SOURCES:
   php-CVE-2006-1490.patch (NONE -> 1.1)  (NEW)

---- Diffs:

================================================================
Index: SOURCES/php-CVE-2006-1490.patch
diff -u /dev/null SOURCES/php-CVE-2006-1490.patch:1.1
--- /dev/null	Wed Apr 19 18:42:06 2006
+++ SOURCES/php-CVE-2006-1490.patch	Wed Apr 19 18:42:01 2006
@@ -0,0 +1,20 @@
+PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of
+memory via crafted binary data sent to a script that processes user
+input in the html_entity_decode function and sends the encoded results
+back to the client, aka a "binary safety" issue. NOTE: this issue has
+been referred to as a "memory leak," but it is an information leak that
+discloses memory contents.
+
+Patch pulled from cvs.php.net
+
+--- php-5.1.2/ext/standard/html.c	2006/01/01 12:50:14	1.111.2.1
++++ php-5.1.2/ext/standard/html.c	2006/02/25 21:32:11	1.111.2.2
+@@ -884,7 +884,7 @@
+ 	unsigned char replacement[15];
+ 	int replacement_len;
+ 
+-	ret = estrdup(old);
++	ret = estrndup(old, oldlen);
+ 	retlen = oldlen;
+ 	if (!retlen) {
+ 		goto empty_source;
================================================================


More information about the pld-cvs-commit mailing list