SOURCES (RA-branch_general): php-zlib-for-getimagesize.patch, php-...

hawk hawk at pld-linux.org
Wed Apr 26 16:01:47 CEST 2006


Author: hawk                         Date: Wed Apr 26 14:01:47 2006 GMT
Module: SOURCES                       Tag: RA-branch_general
---- Log message:
- merged from php4.spec and adjusted for Ra

---- Files affected:
SOURCES:
   php-zlib-for-getimagesize.patch (1.1 -> 1.1.4.1) , php-ini-search-path.patch (1.1 -> 1.1.4.1) , php-openssl-huge-hack.patch (1.1 -> 1.1.4.1) , php-CVE-2006-0996.patch (1.2 -> 1.2.6.1) , php-CVE-2006-1490.patch (1.1 -> 1.1.6.1) 

---- Diffs:

================================================================
Index: SOURCES/php-zlib-for-getimagesize.patch
diff -u SOURCES/php-zlib-for-getimagesize.patch:1.1 SOURCES/php-zlib-for-getimagesize.patch:1.1.4.1
--- SOURCES/php-zlib-for-getimagesize.patch:1.1	Fri Jan  6 19:23:20 2006
+++ SOURCES/php-zlib-for-getimagesize.patch	Wed Apr 26 16:01:42 2006
@@ -2,6 +2,15 @@
 link core php with -lz for getimagesize()
 see also http://bugs.php.net/bug.php?id=29611
 
+--- php-4.4.1/ext/zlib/config0.m4~	2006-01-06 19:09:51.000000000 +0200
++++ php-4.4.1/ext/zlib/config0.m4	2006-01-06 19:09:52.000000000 +0200
+@@ -49,5 +49,6 @@
+   PHP_ZLIB_DIR=$ZLIB_DIR
+   PHP_ADD_LIBRARY(z,, ZLIB_SHARED_LIBADD)
+   PHP_ADD_INCLUDE($ZLIB_INCDIR)
++  EXTRA_LIBS="$EXTRA_LIBS $ZLIB_SHARED_LIBADD"
+ 
+ fi
 --- php-4.4.1/ext/standard/image.c	2005-07-27 14:22:36.000000000 +0300
 +++ /tmp/image.c	2006-01-06 19:14:00.000000000 +0200
 @@ -31,7 +31,7 @@

================================================================
Index: SOURCES/php-ini-search-path.patch
diff -u SOURCES/php-ini-search-path.patch:1.1 SOURCES/php-ini-search-path.patch:1.1.4.1
--- SOURCES/php-ini-search-path.patch:1.1	Tue Jan 17 16:05:40 2006
+++ SOURCES/php-ini-search-path.patch	Wed Apr 26 16:01:42 2006
@@ -1,32 +1,32 @@
 see also http://bugs.php.net/bug.php?id=34793
---- php-5.1.2/main/php_ini.c~	2006-01-12 23:46:12.000000000 +0200
-+++ php-5.1.2/main/php_ini.c	2006-01-17 17:01:16.000000000 +0200
-@@ -330,6 +330,7 @@
- 			strcat(php_ini_search_path, env_location);
- 		}
+--- php-4.4.2/main/php_ini.c~	2006-01-17 19:02:09.000000000 +0200
++++ php-4.4.2/main/php_ini.c	2006-01-17 19:26:46.000000000 +0200
+@@ -19,7 +19,7 @@
+ /* $Id$ */
  
-+#ifdef PHP_WIN32
- 		/* Add cwd (only with CLI) */
- 		if (strcmp(sapi_module.name, "cli") == 0) {
- 			if (*php_ini_search_path) {
-@@ -339,7 +340,6 @@
- 		}
+ /* Check CWD for php.ini */
+-#define INI_CHECK_CWD
++#undef	INI_CHECK_CWD
  
- 		/* Add binary directory */
--#ifdef PHP_WIN32
- 		binary_location = (char *) emalloc(MAXPATHLEN);
- 		if (GetModuleFileName(0, binary_location, MAXPATHLEN) == 0) {
+ #include "php.h"
+ #include "ext/standard/info.h"
+@@ -328,13 +327,13 @@
  			efree(binary_location);
-@@ -356,6 +356,8 @@
  			binary_location = NULL;
  		}
- #endif
+-#else
++
+ 		if (sapi_module.executable_location) {
+ 			binary_location = estrdup(sapi_module.executable_location);
+ 		} else {
+ 			binary_location = NULL;
+ 		}
+-#endif
 +
-+#ifdef PHP_WIN32
  		if (binary_location) {
  			char *separator_location = strrchr(binary_location, DEFAULT_SLASH);
  			
-@@ -370,7 +372,6 @@
+@@ -349,7 +348,6 @@
  		}
  
  		/* Add default location */

================================================================
Index: SOURCES/php-openssl-huge-hack.patch
diff -u SOURCES/php-openssl-huge-hack.patch:1.1 SOURCES/php-openssl-huge-hack.patch:1.1.4.1
--- SOURCES/php-openssl-huge-hack.patch:1.1	Wed Jan 25 12:26:11 2006
+++ SOURCES/php-openssl-huge-hack.patch	Wed Apr 26 16:01:42 2006
@@ -1,7 +1,7 @@
-diff -urN php-5.1.2.org/ext/curl/interface.c php-5.1.2/ext/curl/interface.c
---- php-5.1.2.org/ext/curl/interface.c	2006-01-05 19:07:55.000000000 +0100
-+++ php-5.1.2/ext/curl/interface.c	2006-01-25 14:42:08.980963000 +0100
-@@ -476,6 +476,8 @@
+diff -urN php-4.4.2.org/ext/curl/curl.c php-4.4.2/ext/curl/curl.c
+--- php-4.4.2.org/ext/curl/curl.c	2006-01-05 19:03:18.000000000 +0100
++++ php-4.4.2/ext/curl/curl.c	2006-01-25 22:23:03.429339500 +0100
+@@ -427,6 +427,8 @@
  }
  /* }}} */
  
@@ -10,7 +10,7 @@
  /* {{{ PHP_MSHUTDOWN_FUNCTION
   */
  PHP_MSHUTDOWN_FUNCTION(curl)
-@@ -486,6 +488,7 @@
+@@ -437,6 +439,7 @@
  	php_unregister_url_stream_wrapper("ftp" TSRMLS_CC);
  	php_unregister_url_stream_wrapper("ldap" TSRMLS_CC);
  #endif
@@ -18,7 +18,7 @@
  	curl_global_cleanup();
  #ifdef PHP_CURL_NEED_SSL_TSL
  	php_curl_ssl_cleanup();
-@@ -1621,9 +1624,8 @@
+@@ -1465,9 +1468,8 @@
  	for (i = 0; i < c; ++i) {
  		php_curl_openssl_tsl[i] = tsrm_mutex_alloc();
  	}
@@ -30,7 +30,7 @@
  }
  
  static inline void php_curl_ssl_cleanup(void)
-@@ -1645,6 +1647,17 @@
+@@ -1489,6 +1491,17 @@
  #endif /* PHP_CURL_NEED_OPENSSL_TSL */
  /* }}} */
  

================================================================
Index: SOURCES/php-CVE-2006-0996.patch
diff -u SOURCES/php-CVE-2006-0996.patch:1.2 SOURCES/php-CVE-2006-0996.patch:1.2.6.1
--- SOURCES/php-CVE-2006-0996.patch:1.2	Thu Apr 20 00:26:08 2006
+++ SOURCES/php-CVE-2006-0996.patch	Wed Apr 26 16:01:42 2006
@@ -3,21 +3,23 @@
 via long array variables, including (1) a large number of dimensions or
 (2) long values, which prevents HTML tags from being removed.
 
-Patch pulled from cvs.php.net
+Patch based on php-CVE-2006-0996.patch + gcc 2.95 compilation fix from PHP CVS
 
---- php-5.1.2/ext/standard/info.c	2006/01/01 12:50:15	1.249.2.7
-+++ php-5.1.2/ext/standard/info.c	2006/03/30 19:58:18	1.249.2.9
-@@ -58,6 +58,21 @@
+--- php-4.4.2/ext/standard/info.c	2006-04-19 18:55:10.405669500 +0200
++++ php-4.4.2/ext/standard/info.c	2006-04-19 18:57:39.610994250 +0200
+@@ -58,6 +58,23 @@
  
  PHPAPI extern char *php_ini_opened_path;
  PHPAPI extern char *php_ini_scanned_files;
 +	
 +static int php_info_write_wrapper(const char *str, uint str_length)
 +{
++	int new_len, written;
++	char *elem_esc;
++
 +	TSRMLS_FETCH();
 +
-+	int new_len, written;
-+	char *elem_esc = php_escape_html_entities((char *)str, str_length, &new_len, 0, ENT_QUOTES, NULL TSRMLS_CC);
++	elem_esc = php_escape_html_entities((char *)str, str_length, &new_len, 0, ENT_QUOTES, NULL TSRMLS_CC);
 +
 +	written = php_body_write(elem_esc, new_len TSRMLS_CC);
 +
@@ -29,36 +31,30 @@
  
  /* {{{ _display_module_info
   */
-@@ -135,30 +150,13 @@
+@@ -133,23 +148,12 @@
  				PUTS(" => ");
  			}
  			if (Z_TYPE_PP(tmp) == IS_ARRAY) {
 -				zval *tmp3;
--
 -				MAKE_STD_ZVAL(tmp3);
--
  				if (!sapi_module.phpinfo_as_text) {
  					PUTS("<pre>");
 -				}
 -				php_start_ob_buffer(NULL, 4096, 1 TSRMLS_CC);
--				
--				zend_print_zval_r(*tmp, 0 TSRMLS_CC);
--				
+-				zend_print_zval_r(*tmp, 0);
 -				php_ob_get_buffer(tmp3 TSRMLS_CC);
 -				php_end_ob_buffer(0, 0 TSRMLS_CC);
 -				
+-				elem_esc = php_info_html_esc(Z_STRVAL_P(tmp3) TSRMLS_CC);
+-				PUTS(elem_esc);
+-				efree(elem_esc);
+-				zval_ptr_dtor(&tmp3);
+-
 -				if (!sapi_module.phpinfo_as_text) {
--					elem_esc = php_info_html_esc(Z_STRVAL_P(tmp3) TSRMLS_CC);
--					PUTS(elem_esc);
--					efree(elem_esc);
 +					zend_print_zval_ex((zend_write_func_t) php_info_write_wrapper, *tmp, 0);
  					PUTS("</pre>");
- 				} else {
--					PUTS(Z_STRVAL_P(tmp3));
-+					zend_print_zval_r(*tmp, 0 TSRMLS_CC);
++				} else {
++					zend_print_zval_r(*tmp, 0);
  				}
--				zval_ptr_dtor(&tmp3);
--
  			} else if (Z_TYPE_PP(tmp) != IS_STRING) {
  				tmp2 = **tmp;
- 				zval_copy_ctor(&tmp2);

================================================================
Index: SOURCES/php-CVE-2006-1490.patch
diff -u SOURCES/php-CVE-2006-1490.patch:1.1 SOURCES/php-CVE-2006-1490.patch:1.1.6.1
--- SOURCES/php-CVE-2006-1490.patch:1.1	Wed Apr 19 18:42:01 2006
+++ SOURCES/php-CVE-2006-1490.patch	Wed Apr 26 16:01:42 2006
@@ -7,12 +7,12 @@
 
 Patch pulled from cvs.php.net
 
---- php-5.1.2/ext/standard/html.c	2006/01/01 12:50:14	1.111.2.1
-+++ php-5.1.2/ext/standard/html.c	2006/02/25 21:32:11	1.111.2.2
-@@ -884,7 +884,7 @@
+--- php-4.4.2/ext/standard/html.c	2006/01/01 13:46:57	1.63.2.23.2.1
++++ php-4.4.2/ext/standard/html.c	2006/02/25 21:33:06	1.63.2.23.2.2
+@@ -793,7 +793,7 @@
+ 	enum entity_charset charset = determine_charset(hint_charset TSRMLS_CC);
  	unsigned char replacement[15];
- 	int replacement_len;
- 
+ 	
 -	ret = estrdup(old);
 +	ret = estrndup(old, oldlen);
  	retlen = oldlen;
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/SOURCES/php-zlib-for-getimagesize.patch?r1=1.1&r2=1.1.4.1&f=u
    http://cvs.pld-linux.org/SOURCES/php-ini-search-path.patch?r1=1.1&r2=1.1.4.1&f=u
    http://cvs.pld-linux.org/SOURCES/php-openssl-huge-hack.patch?r1=1.1&r2=1.1.4.1&f=u
    http://cvs.pld-linux.org/SOURCES/php-CVE-2006-0996.patch?r1=1.2&r2=1.2.6.1&f=u
    http://cvs.pld-linux.org/SOURCES/php-CVE-2006-1490.patch?r1=1.1&r2=1.1.6.1&f=u



More information about the pld-cvs-commit mailing list