From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:43665) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dde74-0003Ee-8r for guix-patches@gnu.org; Fri, 04 Aug 2017 11:02:07 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1dde70-0003z3-DG for guix-patches@gnu.org; Fri, 04 Aug 2017 11:02:06 -0400 Received: from debbugs.gnu.org ([208.118.235.43]:39273) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1dde6z-0003yk-Vl for guix-patches@gnu.org; Fri, 04 Aug 2017 11:02:02 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1dde6z-0002vO-Kn for guix-patches@gnu.org; Fri, 04 Aug 2017 11:02:01 -0400 Subject: [bug#27937] Update php to 7.1.8 Resent-Message-ID: Date: Fri, 4 Aug 2017 11:01:38 -0400 From: Leo Famulari Message-ID: <20170804150138.GC14950@jasmine.lan> References: <20170803202200.730c7f63@lepiller.eu> <20170803222010.GB2421@jasmine.lan> <1C708BD2-82DE-4838-8FDD-DE1B3AA71E36@lepiller.eu> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="NDin8bjvE/0mNLFQ" Content-Disposition: inline In-Reply-To: <1C708BD2-82DE-4838-8FDD-DE1B3AA71E36@lepiller.eu> List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+kyle=kyleam.com@gnu.org Sender: "Guix-patches" To: Julien Lepiller Cc: 27937@debbugs.gnu.org --NDin8bjvE/0mNLFQ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Aug 04, 2017 at 08:30:08AM +0200, Julien Lepiller wrote: > >> +From: LEPILLER Julien > >> +Date: Thu, 3 Aug 2017 17:04:17 +0200 > >> +Subject: [PATCH] Fix #399: Buffer over-read into uninitialized > >memory. > >> + > >> +The stack allocated color map buffers were not zeroed before usage, > >and > >> +so undefined palette indexes could cause information leakage. > >> + > >> +This is CVE-2017-7890. > > > >Would this patch be valuable for the "regular" gd package as well, or > >is > >it specific to gd-for-php? >=20 > It could be used for gd, but I think it would trigger a lot of > rebuilds. I'm not confident with how the graft mechanism works, so I > would need some help. Okay, I'll look into it this weekend, unless somebody beats me to it. Next time there are lots of Guix people gathered together, I want to hold some kind of "security updates workshop", with the goal of helping more people feel comfortable working in this area. For gd in particular, if you have some specific questions, I can answer them over email. Surely more people have questions, too. The discussion could result in improvements to the manual's section on this topic. > Arg... those are tabs I guess. Thanks for the review! I will push it > this evening if everything is ok. Great! --NDin8bjvE/0mNLFQ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEsFFZSPHn08G5gDigJkb6MLrKfwgFAlmEjFIACgkQJkb6MLrK fwhciBAAvzzpsSuVh5QQ41TqcCsVxT3ZaLWIU5+RW40rNaPdJfPM6+OokjDUQSua OtGnoYIRg/bJ3nEsQPMM0ZPJ93vLtN1XHv1SKHLf24nGmlMIfy1T8SbyC/yFp5Cv YnwGHCBdbxJSJhQvhuYzxwAnGqLTmgjJGBihipbQTQm+sYqyYUo5FGGqPNhgX2KJ KHCY1AOwNrc9GnCA3YX1ex6EoNLOMJqoly6OPS53wt+rK0qdgVIREcAQDpNE/Z5Z KU7RXtY9CUAIOkmds9dvkzi5ulxfA1ahF7o+cUAbnJwmeBCzA8thk2U6i/JW32/a 5LAZNuq1cvudMvhXagHLDJTHbWOpY9lE4qtlEJQbOHKlI5K7YfvDK9YKEadH0Wnf DYgRnLekj/8uNiVhJgSjG/SGL/eCiTJcPnT2VLtpscYxJ41eFdURmN6c8DL5Qycm pYiaLy5D8gJ2AXdSzU6zIyw7TkHpwnBQqykpGyEpfje0dgZ0ZYfpkpYWcyZEMLPY dZm4Y4yoEVbgaWkYaNyIbTxDXXDcKmD0rnrvN1Yod1Vw4piRLp/wlqZx/bh2u3cL gg6Yx2F6BBW8Jysy/zVUpyZlb2bl6to9/HoutlJ1fFGyya90PRGgceBNVT4ImryP Yh3W+KZQRbeU9D8PgUIRYff72yf4Mu/mM0vre8/5UOIZo44res4= =Tai6 -----END PGP SIGNATURE----- --NDin8bjvE/0mNLFQ--