Blame SOURCES/php-5.6.5-CVE-2015-2783.patch

f90754
From 9faaee66fa493372c7340b1ab05f8fd115131a42 Mon Sep 17 00:00:00 2001
f90754
From: Stanislav Malyshev <stas@php.net>
f90754
Date: Sun, 5 Apr 2015 15:07:36 -0700
f90754
Subject: [PATCH] Fixed bug #69324 (Buffer Over-read in unserialize when
f90754
 parsing Phar)
f90754
f90754
---
f90754
 ext/phar/phar.c              |  65 ++++++++++++++++++++-----------------------
f90754
 ext/phar/phar_internal.h     |   2 +-
f90754
 ext/phar/tests/bug69324.phar | Bin 0 -> 269 bytes
f90754
 ext/phar/tests/bug69324.phpt |  17 +++++++++++
f90754
 4 files changed, 48 insertions(+), 36 deletions(-)
f90754
 create mode 100644 ext/phar/tests/bug69324.phar
f90754
 create mode 100644 ext/phar/tests/bug69324.phpt
f90754
f90754
diff --git a/ext/phar/phar.c b/ext/phar/phar.c
f90754
index ec82351..bf0c985 100644
f90754
--- a/ext/phar/phar.c
f90754
+++ b/ext/phar/phar.c
f90754
@@ -601,25 +601,18 @@ int phar_open_parsed_phar(char *fname, int fname_len, char *alias, int alias_len
f90754
  * 
f90754
  * data is the serialized zval
f90754
  */
f90754
-int phar_parse_metadata(char **buffer, zval **metadata, int zip_metadata_len TSRMLS_DC) /* {{{ */
f90754
+int phar_parse_metadata(char **buffer, zval **metadata, php_uint32 zip_metadata_len TSRMLS_DC) /* {{{ */
f90754
 {
f90754
 	const unsigned char *p;
f90754
-	php_uint32 buf_len;
f90754
 	php_unserialize_data_t var_hash;
f90754
 
f90754
-	if (!zip_metadata_len) {
f90754
-		PHAR_GET_32(*buffer, buf_len);
f90754
-	} else {
f90754
-		buf_len = zip_metadata_len;
f90754
-	}
f90754
-
f90754
-	if (buf_len) {
f90754
+	if (zip_metadata_len) {
f90754
 		ALLOC_ZVAL(*metadata);
f90754
 		INIT_ZVAL(**metadata);
f90754
 		p = (const unsigned char*) *buffer;
f90754
 		PHP_VAR_UNSERIALIZE_INIT(var_hash);
f90754
 
f90754
-		if (!php_var_unserialize(metadata, &p, p + buf_len, &var_hash TSRMLS_CC)) {
f90754
+		if (!php_var_unserialize(metadata, &p, p + zip_metadata_len, &var_hash TSRMLS_CC)) {
f90754
 			PHP_VAR_UNSERIALIZE_DESTROY(var_hash);
f90754
 			zval_ptr_dtor(metadata);
f90754
 			*metadata = NULL;
f90754
@@ -631,19 +624,14 @@ int phar_parse_metadata(char **buffer, zval **metadata, int zip_metadata_len TSR
f90754
 		if (PHAR_G(persist)) {
f90754
 			/* lazy init metadata */
f90754
 			zval_ptr_dtor(metadata);
f90754
-			*metadata = (zval *) pemalloc(buf_len, 1);
f90754
-			memcpy(*metadata, *buffer, buf_len);
f90754
-			*buffer += buf_len;
f90754
+			*metadata = (zval *) pemalloc(zip_metadata_len, 1);
f90754
+			memcpy(*metadata, *buffer, zip_metadata_len);
f90754
 			return SUCCESS;
f90754
 		}
f90754
 	} else {
f90754
 		*metadata = NULL;
f90754
 	}
f90754
 
f90754
-	if (!zip_metadata_len) {
f90754
-		*buffer += buf_len;
f90754
-	}
f90754
-
f90754
 	return SUCCESS;
f90754
 }
f90754
 /* }}}*/
f90754
@@ -664,6 +652,7 @@ static int phar_parse_pharfile(php_stream *fp, char *fname, int fname_len, char
f90754
 	phar_entry_info entry;
f90754
 	php_uint32 manifest_len, manifest_count, manifest_flags, manifest_index, tmp_len, sig_flags;
f90754
 	php_uint16 manifest_ver;
f90754
+	php_uint32 len;
f90754
 	long offset;
f90754
 	int sig_len, register_alias = 0, temp_alias = 0;
f90754
 	char *signature = NULL;
f90754
@@ -1029,16 +1018,21 @@ static int phar_parse_pharfile(php_stream *fp, char *fname, int fname_len, char
f90754
 	mydata->is_persistent = PHAR_G(persist);
f90754
 
f90754
 	/* check whether we have meta data, zero check works regardless of byte order */
f90754
+	PHAR_GET_32(buffer, len);
f90754
 	if (mydata->is_persistent) {
f90754
-		PHAR_GET_32(buffer, mydata->metadata_len);
f90754
-		if (phar_parse_metadata(&buffer, &mydata->metadata, mydata->metadata_len TSRMLS_CC) == FAILURE) {
f90754
-			MAPPHAR_FAIL("unable to read phar metadata in .phar file \"%s\"");
f90754
-		}
f90754
-	} else {
f90754
-		if (phar_parse_metadata(&buffer, &mydata->metadata, 0 TSRMLS_CC) == FAILURE) {
f90754
-			MAPPHAR_FAIL("unable to read phar metadata in .phar file \"%s\"");
f90754
+		mydata->metadata_len = len;
f90754
+		if(!len) {
f90754
+			/* FIXME: not sure why this is needed but removing it breaks tests */
f90754
+			PHAR_GET_32(buffer, len);
f90754
 		}
f90754
 	}
f90754
+	if(len > endbuffer - buffer) {
f90754
+		MAPPHAR_FAIL("internal corruption of phar \"%s\" (trying to read past buffer end)");
f90754
+	}
f90754
+	if (phar_parse_metadata(&buffer, &mydata->metadata, len TSRMLS_CC) == FAILURE) {
f90754
+		MAPPHAR_FAIL("unable to read phar metadata in .phar file \"%s\"");
f90754
+	}
f90754
+	buffer += len;
f90754
 
f90754
 	/* set up our manifest */
f90754
 	zend_hash_init(&mydata->manifest, manifest_count,
f90754
@@ -1073,7 +1067,7 @@ static int phar_parse_pharfile(php_stream *fp, char *fname, int fname_len, char
f90754
 			entry.manifest_pos = manifest_index;
f90754
 		}
f90754
 
f90754
-		if (buffer + entry.filename_len + 20 > endbuffer) {
f90754
+		if (entry.filename_len + 20 > endbuffer - buffer) {
f90754
 			MAPPHAR_FAIL("internal corruption of phar \"%s\" (truncated manifest entry)");
f90754
 		}
f90754
 
f90754
@@ -1109,19 +1103,20 @@ static int phar_parse_pharfile(php_stream *fp, char *fname, int fname_len, char
f90754
 			entry.flags |= PHAR_ENT_PERM_DEF_DIR;
f90754
 		}
f90754
 
f90754
+		PHAR_GET_32(buffer, len);
f90754
 		if (entry.is_persistent) {
f90754
-			PHAR_GET_32(buffer, entry.metadata_len);
f90754
-			if (!entry.metadata_len) buffer -= 4;
f90754
-			if (phar_parse_metadata(&buffer, &entry.metadata, entry.metadata_len TSRMLS_CC) == FAILURE) {
f90754
-				pefree(entry.filename, entry.is_persistent);
f90754
-				MAPPHAR_FAIL("unable to read file metadata in .phar file \"%s\"");
f90754
-			}
f90754
+			entry.metadata_len = len;
f90754
 		} else {
f90754
-			if (phar_parse_metadata(&buffer, &entry.metadata, 0 TSRMLS_CC) == FAILURE) {
f90754
-				pefree(entry.filename, entry.is_persistent);
f90754
-				MAPPHAR_FAIL("unable to read file metadata in .phar file \"%s\"");
f90754
-			}
f90754
+			entry.metadata_len = 0;
f90754
+		}
f90754
+		if (len > endbuffer - buffer) {
f90754
+			MAPPHAR_FAIL("internal corruption of phar \"%s\" (truncated manifest entry)");
f90754
+		}
f90754
+		if (phar_parse_metadata(&buffer, &entry.metadata, len TSRMLS_CC) == FAILURE) {
f90754
+			pefree(entry.filename, entry.is_persistent);
f90754
+			MAPPHAR_FAIL("unable to read file metadata in .phar file \"%s\"");
f90754
 		}
f90754
+		buffer += len;
f90754
 
f90754
 		entry.offset = entry.offset_abs = offset;
f90754
 		offset += entry.compressed_filesize;
f90754
diff --git a/ext/phar/phar_internal.h b/ext/phar/phar_internal.h
f90754
index c9306c1..fcfc864 100644
f90754
--- a/ext/phar/phar_internal.h
f90754
+++ b/ext/phar/phar_internal.h
f90754
@@ -570,7 +570,7 @@ int phar_mount_entry(phar_archive_data *phar, char *filename, int filename_len,
f90754
 char *phar_find_in_include_path(char *file, int file_len, phar_archive_data **pphar TSRMLS_DC);
f90754
 char *phar_fix_filepath(char *path, int *new_len, int use_cwd TSRMLS_DC);
f90754
 phar_entry_info * phar_open_jit(phar_archive_data *phar, phar_entry_info *entry, char **error TSRMLS_DC);
f90754
-int phar_parse_metadata(char **buffer, zval **metadata, int zip_metadata_len TSRMLS_DC);
f90754
+int phar_parse_metadata(char **buffer, zval **metadata, php_uint32 zip_metadata_len TSRMLS_DC);
f90754
 void destroy_phar_manifest_entry(void *pDest);
f90754
 int phar_seek_efp(phar_entry_info *entry, off_t offset, int whence, off_t position, int follow_links TSRMLS_DC);
f90754
 php_stream *phar_get_efp(phar_entry_info *entry, int follow_links TSRMLS_DC);
f90754
-- 
f90754
2.1.4
f90754
f90754
From 12d3bdee3dfa6605024a72080d8a17c165c5ed24 Mon Sep 17 00:00:00 2001
f90754
From: Stanislav Malyshev <stas@php.net>
f90754
Date: Sat, 11 Apr 2015 16:42:16 -0700
f90754
Subject: [PATCH] Additional fix for bug #69324
f90754
f90754
Not so happy about duplication but needed due to bug #69429
f90754
---
f90754
 ext/phar/phar.c | 13 +++++++------
f90754
 1 file changed, 7 insertions(+), 6 deletions(-)
f90754
f90754
diff --git a/ext/phar/phar.c b/ext/phar/phar.c
f90754
index bf0c985..c5c8b46 100644
f90754
--- a/ext/phar/phar.c
f90754
+++ b/ext/phar/phar.c
f90754
@@ -598,27 +598,28 @@ int phar_open_parsed_phar(char *fname, int fname_len, char *alias, int alias_len
f90754
  *
f90754
  * Meta-data is in this format:
f90754
  * [len32][data...]
f90754
- * 
f90754
+ *
f90754
  * data is the serialized zval
f90754
  */
f90754
 int phar_parse_metadata(char **buffer, zval **metadata, php_uint32 zip_metadata_len TSRMLS_DC) /* {{{ */
f90754
 {
f90754
-	const unsigned char *p;
f90754
 	php_unserialize_data_t var_hash;
f90754
 
f90754
 	if (zip_metadata_len) {
f90754
+		const unsigned char *p, *p_buff = estrndup(*buffer, zip_metadata_len);
f90754
+		p = p_buff;
f90754
 		ALLOC_ZVAL(*metadata);
f90754
 		INIT_ZVAL(**metadata);
f90754
-		p = (const unsigned char*) *buffer;
f90754
 		PHP_VAR_UNSERIALIZE_INIT(var_hash);
f90754
 
f90754
 		if (!php_var_unserialize(metadata, &p, p + zip_metadata_len, &var_hash TSRMLS_CC)) {
f90754
+			efree(p_buff);
f90754
 			PHP_VAR_UNSERIALIZE_DESTROY(var_hash);
f90754
 			zval_ptr_dtor(metadata);
f90754
 			*metadata = NULL;
f90754
 			return FAILURE;
f90754
 		}
f90754
-
f90754
+		efree(p_buff);
f90754
 		PHP_VAR_UNSERIALIZE_DESTROY(var_hash);
f90754
 
f90754
 		if (PHAR_G(persist)) {
f90754
@@ -641,7 +642,7 @@ int phar_parse_metadata(char **buffer, zval **metadata, php_uint32 zip_metadata_
f90754
  *
f90754
  * Parse a new one and add it to the cache, returning either SUCCESS or
f90754
  * FAILURE, and setting pphar to the pointer to the manifest entry
f90754
- * 
f90754
+ *
f90754
  * This is used by phar_open_from_filename to process the manifest, but can be called
f90754
  * directly.
f90754
  */
f90754
@@ -2212,7 +2213,7 @@ last_time:
f90754
 
f90754
 /**
f90754
  * Process a phar stream name, ensuring we can handle any of:
f90754
- * 
f90754
+ *
f90754
  * - whatever.phar
f90754
  * - whatever.phar.gz
f90754
  * - whatever.phar.bz2
f90754
-- 
f90754
2.1.4
f90754
f90754
From cee97220285fd7b955a58617b3e0300ec104ed87 Mon Sep 17 00:00:00 2001
f90754
From: Dmitry Stogov <dmitry@zend.com>
f90754
Date: Tue, 14 Apr 2015 15:47:26 +0300
f90754
Subject: [PATCH] Fixed recently introduced memory leak
f90754
f90754
---
f90754
 ext/phar/phar.c | 1 +
f90754
 1 file changed, 1 insertion(+)
f90754
f90754
diff --git a/ext/phar/phar.c b/ext/phar/phar.c
f90754
index c5c8b46..223bfe8 100644
f90754
--- a/ext/phar/phar.c
f90754
+++ b/ext/phar/phar.c
f90754
@@ -1111,6 +1111,7 @@ static int phar_parse_pharfile(php_stream *fp, char *fname, int fname_len, char
f90754
 			entry.metadata_len = 0;
f90754
 		}
f90754
 		if (len > endbuffer - buffer) {
f90754
+			pefree(entry.filename, entry.is_persistent);
f90754
 			MAPPHAR_FAIL("internal corruption of phar \"%s\" (truncated manifest entry)");
f90754
 		}
f90754
 		if (phar_parse_metadata(&buffer, &entry.metadata, len TSRMLS_CC) == FAILURE) {
f90754
-- 
f90754
2.1.4
f90754