summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjvoisin2019-10-13 12:43:38 +0200
committerjvoisin2019-10-13 12:44:44 +0200
commit940d87113a92acce7f06c6218c962570926e28bc (patch)
tree44649f03939cd9cd5b15b5ca67a3c4339f40e61d
parent6113feef6838633df32f91f96c98318a6de605fe (diff)
Add the changelog
-rw-r--r--CHANGELOG211
1 files changed, 211 insertions, 0 deletions
diff --git a/CHANGELOG b/CHANGELOG
new file mode 100644
index 0000000..3cd69c1
--- /dev/null
+++ b/CHANGELOG
@@ -0,0 +1,211 @@
1Hardening Patch 0.4.14
2
3 Added a critical fix for the patch against PHP 5.1.x - Remote URL Include Protection was not working. (only 5.1.x affected) Credits: Bart Vanbrabrant
4 Added more upstream security fixes for PHP 4/5
5 Added a fix for a Zend Engine memory corruption
6 Changed the way the memory_limit protection is implemented
7
8Hardening Patch 0.4.13
9
10 Added a hphp_strcasestr() function to work around a compilation problem on f.e. solaris systems
11
12Hardening Patch 0.4.12
13
14 Added a whole bunch of security fixes for PHP 4.4.2 and PHP 5.1.4 (some are not in upstream PHP)
15 Added a slight modification that improves the speed of the zend_hash canary protection
16 Added a feature to protect against various mail header attacks through mail() (newly introduced hphp.mail.protect directive)
17 Added a fix for a potential DOS vulnerability in the URL blacklist handling. Credits: Pavel Stano reported this bug
18
19Hardening Patch 0.4.11
20
21 Added a security fix for PHP 5.1’s realpath() cache
22 Bundle install-pear-nozlib.phar because it was missing in original PHP 5.1.4 tarball
23 Hotfix to realpath() to solve problems with non existing directories
24
25Hardening Patch 0.4.10
26
27 Fixed a compilation problem in PHP4 + ZTS mode
28 Finally fixed a trailing slash problem with open_baedir
29 Added a changelog file to the Hardening-Patch distribution to better keep up with changes
30
31Hardening Patch 0.4.9
32
33 Fixes a problem with trailing / in open_basedirs
34 Adds PHP‘s invalid characters in session identifier check
35 Adds security fixes from PHP (temporary file, zend_hash, phpinfo(), wordwrap(), htmlentities())
36
37Hardening Patch 0.4.8
38
39 Fixes an uninitialised variable in the HTTP Response Splitting Protection, that resulted in HTTP headers beeing not sent
40
41Hardening Patch 0.4.7
42
43 Fixes a problem with persistent Zend LList Canaries
44 Added a fix for a safe_mode bypass vulnerability in ext/curl
45
46Hardening Patch 0.4.6
47
48 Fixed some error situations in virtual_file_ex()
49 Added a dummy padding variable to work around a GCC bug
50 Changed Hardening-Patch’s module number
51 Moved HTTP Response Splitting Protection into the varfilter extension
52 Added protection of long superglobals against HTTP headers
53 Added session_id validation and creation hooks to the session extension
54 Backported delete old session flag from PHP 5.1 in session_regenerate_id()
55 Added session hooks to sqlite session handler
56
57Hardening Patch 0.4.5
58
59 Added fixes for ext/curl, ext/gd safe_mode/open_basedir bypass vulnerabilities
60 Addes an advertisement for http://www.hardened-php.net to phpinfo()
61 Changed that only the first forbidden variable is logged
62 Changed white- and blacklists to be persistent
63
64Hardening Patch 0.4.4
65
66 Changed the UPLOAD_ERR_FILTER numerical code
67 Disallow overwritting GLOBALS inside php_register_variable_ex()
68 Added a memory manager canary change between requests
69 Added more safe_mode/open_basedir checks to ext/curl, ext/gd
70 Added protection against ASCIIZ characters in user input
71 Backported some security fixes like register_globals reactivation through parse_str()
72 Backported a fix for memory_limit not beeing reset
73
74Hardening Patch 0.4.3
75
76 Added another hook for file uploads, that only checks the variablename. This also requires bumping the internal Hardening-Patch API number
77 Added black- and whitelist support for URL shemes in include filenames
78
79Hardening Patch 0.4.2
80
81 Added Solar Designer’s CRYPT_BLOWFISH implementation, to have CRYPT_BLOWFISH support in crypt() on all platforms
82 Added sha256() and sha256_file() functions that implement the successor of sha1
83 Update to XML_RPC 1.4.0 to eliminate eval() injection vulnerability
84
85Hardening Patch 0.4.1
86
87 register_tick_function, register_shutdown_function callbacks recognize being set from within eval()
88 functions and classes registered within eval() will automatically be handled as eval()’d code if the main script calls them (f.e. through callbacks)
89 WARNING: the eval() function black- and whitelist do NOT protect against eval()’d code manipulating the execution flow of the main script by changing the content of variables. (Variable access black- and whitelists are sheduled for a later version)
90
91Hardening Patch 0.4.0
92
93 Binary compatibility with older Hardening-Patch versions again broken to ensure compatibility with APC and similiar extensions.
94 PHP/Zend API numbers restored to PHP originals
95 Additional Hardening-Patch API numbers introduced
96 Fixed: Access to memory manager canaries could result in not aligned memory accesses
97 Fixed: Only use C style comments
98 New Feature: Introduced whitelists and blacklists for functions, like disable_functions but configurable on a per directory basis.
99 New Feature: Introduced separate whitelists and blacklists for functions that are called from within eval().
100
101Hardening Patch v0.3.2
102
103 Fixes a compilation error in ext/MySQLi
104 Fixes that without a verification script in place all fileuploads were forbidden
105
106Hardening Patch v0.3.1
107
108 Fixes a compilation error that exists in 0.3.0 (Thanks to Michal Lukaszek <prism@pld-linux.org >)
109 header() does not allow setting multiple HTTP headers at once
110 hphp.multiheader=On/Off controls this
111 Failed SQL Queries can now be logged in fbsql/mysql/mysqli/pgsql and sqlite
112 hphp.sql.bailout_on_error=On/Off allows termintating a script after failed queries
113
114Hardening Patch v0.3.0
115
116 Logging of ALERT classes can now be configured by class
117 Syslog facility and priority is now configurable
118 ALERTS can be logged by the SAPI error log
119 ALERTS can be logged by an external logging script
120 Attackers IP addresses can now be extracted from X-Forwarded-For headers
121 GET, POST, COOKIE variables with the following names are not registered:
122 GLOBALS, _COOKIE, _ENV, _FILES, _GET, _POST
123 _REQUEST, _SERVER, _SESSION, HTTP_COOKIE_VARS
124 HTTP_ENV_VARS, HTTP_GET_VARS, HTTP_POST_FILES,
125 HTTP_POST_VARS, HTTP_RAW_POST_DATA,
126 HTTP_SERVER_VARS, HTTP_SESSION_VARS
127 Following limits can be enforced on either COOKIE, GET and POST variables or on all REQUEST variables independent of origin
128 Number of variables
129 Maximum length of variable name [with and without indices]
130 Maximum length of array indices
131 Maximum length of variable value
132 Maximum depth of array
133 Number of uploadable files can be limited
134 Uploaded files can now be passed to an external verification script
135 Uploaded ELF files can be automatically filtered away
136 Execution Depth Limit
137 Failing SQL Queries within the MySQL extension can be logged
138 XML_RPC 1.3.1 replaces the vulnerable 1.2.2
139
140Hardening Patch v0.2.7
141
142 backport of fixes for vulnerabilities in PHP 4.3.10
143 fixes bug with open_basedir and mkdir with trailing slashes
144 adds safe unlink again, because canaries alone aren’t good enough
145 fixes non randomness of hash table canaries
146
147Hardening Patch v0.2.6
148
149 fixes compile problem on Solaris system
150 breaks binary compatibility to normal PHP by using some PHP5 structs in PHP4
151
152Hardening Patch v0.2.5
153
154 no new features
155 fixes compile problems on some platforms
156 fixes the new realpath() implementation with some symlinks
157
158Hardening Patch v0.2.4
159
160 backported fixes for CAN-2004-1018, CAN-2004-1019, CAN-2004-1020
161 and for CAN-2004-1063, CAN-2004-1064, CAN-2004-1065
162 adds protection of superglobals from extract()
163 replaces realpath() with an implementation based on FreeBSD’s realpath()
164 memory_limit cannot be raised over configured limit anymore
165
166Hardening Patch v0.2.3
167
168 fixes problem with logging the IP from varfilter extension
169 fixes logging under syslog-ng
170 adds protection of superglobals from import_request_variables()
171 fixes bug within addslashes within 4.3.9
172 adds logging of filename to php-security logs (does not work in all sapi yet)
173 increases maximum length of a variable to 10000 within varfilter
174 adds HARDENED_PHP and HARDENED_PHP_VERSION constants
175
176Hardening Patch v0.2.2 fixes
177
178 incompatibility between some configurations and HashTable Destructor protection
179
180Hardening Patch v0.2.1 fixes
181
182 compile problem with ext/mbstring
183 Basic Auth problem in PHP 5.0.0
184
185Hardening Patch v0.2.0 adds
186
187 all security fixes from PHP 4.3.8 for PHP 4.3.7 users
188 Canary protection of Zend HashTable destructors
189 Backport of PHP5’s input_filter technology
190 Hardening Patch’s varfilter extension
191
192Hardening Patch v0.1.2 adds
193
194 PHP5 compatibility (non ZTS)
195 full ZTS compatibility
196 and some other small fixes
197
198Hardening Patch v0.1.1 adds
199
200 memory_limit check relocation
201 and some other small fixes
202
203Hardening Patch v0.1.0 implements
204
205 Canary protection of the Zend Memory Manager
206 Canary protection of Zend Linked Lists
207 Protection against internal format string exploits
208 Protection against arbitrary code inclusion
209 Syslog logging of attackers IP
210
211