From nobody@FreeBSD.org  Sat Nov 17 17:48:19 2012
Return-Path: <nobody@FreeBSD.org>
Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52])
	by hub.freebsd.org (Postfix) with ESMTP id 177453C0
	for <freebsd-gnats-submit@FreeBSD.org>; Sat, 17 Nov 2012 17:48:19 +0000 (UTC)
	(envelope-from nobody@FreeBSD.org)
Received: from red.freebsd.org (red.freebsd.org [IPv6:2001:4f8:fff6::22])
	by mx1.freebsd.org (Postfix) with ESMTP id D714C8FC08
	for <freebsd-gnats-submit@FreeBSD.org>; Sat, 17 Nov 2012 17:48:18 +0000 (UTC)
Received: from red.freebsd.org (localhost [127.0.0.1])
	by red.freebsd.org (8.14.5/8.14.5) with ESMTP id qAHHmIpR082923
	for <freebsd-gnats-submit@FreeBSD.org>; Sat, 17 Nov 2012 17:48:18 GMT
	(envelope-from nobody@red.freebsd.org)
Received: (from nobody@localhost)
	by red.freebsd.org (8.14.5/8.14.5/Submit) id qAHHmIAF082922;
	Sat, 17 Nov 2012 17:48:18 GMT
	(envelope-from nobody)
Message-Id: <201211171748.qAHHmIAF082922@red.freebsd.org>
Date: Sat, 17 Nov 2012 17:48:18 GMT
From: Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
To: freebsd-gnats-submit@FreeBSD.org
Subject: [update] lang/php52 to 5.2.17_12 (20121114)
X-Send-Pr-Version: www-3.1
X-GNATS-Notify: admin@lissyara.su

>Number:         173685
>Category:       ports
>Synopsis:       [update] lang/php52 to 5.2.17_12 (20121114)
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    flo
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Sat Nov 17 17:50:00 UTC 2012
>Closed-Date:    Sun Nov 25 15:45:23 UTC 2012
>Last-Modified:  Sun Nov 25 15:45:23 UTC 2012
>Originator:     Svyatoslav Lempert
>Release:        9.1-PRERELEASE
>Organization:
>Environment:
>Description:
- Update backports patch to 20121114
- Bump PORTREVISION

Changes:
- CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function

Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions for strlen(filename) != filename_len

- CVE-2012-4388
The sapi_header_op function in main/SAPI.c does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, this vulnerability exists because of an incorrect fix for CVE-2011-1398.

- Timezone database updated to version 2012.9 (2012i)

Note:
I have no more wishes to support PHP 5.2.17 and strongly recommend updating to the latest vendor-supported version (php53/php5)
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

diff -Nru php52.old/Makefile php52/Makefile
--- php52.old/Makefile	2012-09-20 03:02:43.000000000 +0000
+++ php52/Makefile	2012-11-14 18:24:50.000000000 +0000
@@ -7,7 +7,7 @@
 
 PORTNAME=	php52
 PORTVERSION=	5.2.17
-PORTREVISION=	11
+PORTREVISION=	12
 CATEGORIES?=	lang devel www
 MASTER_SITES=	${MASTER_SITE_PHP}
 MASTER_SITE_SUBDIR=	distributions
@@ -26,7 +26,7 @@
 MAKE_JOBS_SAFE=	yes
 
 # BACKPORTS patch for lang/php52 and all php52-extensions
-PATCHFILES=	php52-backports-security-20120911.patch
+PATCHFILES=	php52-backports-security-20121114.patch
 PATCH_SITES+=	http://php52-backports.googlecode.com/files/
 
 .if !defined(PKGNAMESUFFIX)
diff -Nru php52.old/distinfo php52/distinfo
--- php52.old/distinfo	2012-09-20 03:02:43.000000000 +0000
+++ php52/distinfo	2012-11-14 18:26:51.000000000 +0000
@@ -1,7 +1,7 @@
 SHA256 (php-5.2.17.tar.bz2) = e81beb13ec242ab700e56f366e9da52fd6cf18961d155b23304ca870e53f116c
 SIZE (php-5.2.17.tar.bz2) = 9092312
-SHA256 (php52-backports-security-20120911.patch) = 4911e2a5abb72d0558b2baf07ff64ca054d71219bde183e41b591894fb7cb1f6
-SIZE (php52-backports-security-20120911.patch) = 356599
+SHA256 (php52-backports-security-20121114.patch) = 59dc139b9acf86bbb2e281696765de513c3bec7d43392a10b5f3b36a9881ab00
+SIZE (php52-backports-security-20121114.patch) = 410829
 SHA256 (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 354ce451417d14ef47761ae55147e9cee30fa0ff6f59447da021194c539f4d7f
 SIZE (php-5.2.14-fpm-0.5.14-freebsd.patch.gz) = 43550
 SHA256 (suhosin-patch-5.2.16-0.9.7.patch.gz) = aae115a318d80b3f32cedf876e7a8e4b932febb1b0c743c0b398003ebe122f91


>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->feedback 
State-Changed-By: edwin 
State-Changed-When: Sat Nov 17 17:50:35 UTC 2012 
State-Changed-Why:  
Awaiting maintainers feedback (via the GNATS Auto Assign Tool) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=173685 

From: Edwin Groothuis <edwin@FreeBSD.org>
To: admin@lissyara.su
Cc: bug-followup@FreeBSD.org
Subject: Re: ports/173685: [update] lang/php52 to 5.2.17_12 (20121114)
Date: Sat, 17 Nov 2012 17:50:34 UT

 Maintainer of lang/php52,
 
 Please note that PR ports/173685 has just been submitted.
 
 If it contains a patch for an upgrade, an enhancement or a bug fix
 you agree on, reply to this email stating that you approve the patch
 and a committer will take care of it.
 
 The full text of the PR can be found at:
     http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/173685
 
 -- 
 Edwin Groothuis via the GNATS Auto Assign Tool
 edwin@FreeBSD.org

From: Alex Keda <admin@lissyara.su>
To: bug-followup@FreeBSD.org
Cc:  
Subject: Re: ports/173685: [update] lang/php52 to 5.2.17_12 (20121114)
Date: Fri, 23 Nov 2012 19:44:23 +0400

 please, commit this patch
Responsible-Changed-From-To: freebsd-ports-bugs->flo 
Responsible-Changed-By: flo 
Responsible-Changed-When: Sat Nov 24 09:58:20 UTC 2012 
Responsible-Changed-Why:  
I'll take it. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=173685 
State-Changed-From-To: feedback->closed 
State-Changed-By: flo 
State-Changed-When: Sun Nov 25 15:45:21 UTC 2012 
State-Changed-Why:  
Committed. Thanks! 

http://www.freebsd.org/cgi/query-pr.cgi?pr=173685 
>Unformatted:
