diff options
| author | jvoisin | 2019-10-13 12:43:38 +0200 |
|---|---|---|
| committer | jvoisin | 2019-10-13 12:44:44 +0200 |
| commit | 940d87113a92acce7f06c6218c962570926e28bc (patch) | |
| tree | 44649f03939cd9cd5b15b5ca67a3c4339f40e61d /CHANGELOG | |
| parent | 6113feef6838633df32f91f96c98318a6de605fe (diff) | |
Add the changelog
Diffstat (limited to 'CHANGELOG')
| -rw-r--r-- | CHANGELOG | 211 |
1 files changed, 211 insertions, 0 deletions
diff --git a/CHANGELOG b/CHANGELOG new file mode 100644 index 0000000..3cd69c1 --- /dev/null +++ b/CHANGELOG | |||
| @@ -0,0 +1,211 @@ | |||
| 1 | Hardening Patch 0.4.14 | ||
| 2 | |||
| 3 | Added a critical fix for the patch against PHP 5.1.x - Remote URL Include Protection was not working. (only 5.1.x affected) Credits: Bart Vanbrabrant | ||
| 4 | Added more upstream security fixes for PHP 4/5 | ||
| 5 | Added a fix for a Zend Engine memory corruption | ||
| 6 | Changed the way the memory_limit protection is implemented | ||
| 7 | |||
| 8 | Hardening Patch 0.4.13 | ||
| 9 | |||
| 10 | Added a hphp_strcasestr() function to work around a compilation problem on f.e. solaris systems | ||
| 11 | |||
| 12 | Hardening Patch 0.4.12 | ||
| 13 | |||
| 14 | Added a whole bunch of security fixes for PHP 4.4.2 and PHP 5.1.4 (some are not in upstream PHP) | ||
| 15 | Added a slight modification that improves the speed of the zend_hash canary protection | ||
| 16 | Added a feature to protect against various mail header attacks through mail() (newly introduced hphp.mail.protect directive) | ||
| 17 | Added a fix for a potential DOS vulnerability in the URL blacklist handling. Credits: Pavel Stano reported this bug | ||
| 18 | |||
| 19 | Hardening Patch 0.4.11 | ||
| 20 | |||
| 21 | Added a security fix for PHP 5.1’s realpath() cache | ||
| 22 | Bundle install-pear-nozlib.phar because it was missing in original PHP 5.1.4 tarball | ||
| 23 | Hotfix to realpath() to solve problems with non existing directories | ||
| 24 | |||
| 25 | Hardening Patch 0.4.10 | ||
| 26 | |||
| 27 | Fixed a compilation problem in PHP4 + ZTS mode | ||
| 28 | Finally fixed a trailing slash problem with open_baedir | ||
| 29 | Added a changelog file to the Hardening-Patch distribution to better keep up with changes | ||
| 30 | |||
| 31 | Hardening Patch 0.4.9 | ||
| 32 | |||
| 33 | Fixes a problem with trailing / in open_basedirs | ||
| 34 | Adds PHP‘s invalid characters in session identifier check | ||
| 35 | Adds security fixes from PHP (temporary file, zend_hash, phpinfo(), wordwrap(), htmlentities()) | ||
| 36 | |||
| 37 | Hardening Patch 0.4.8 | ||
| 38 | |||
| 39 | Fixes an uninitialised variable in the HTTP Response Splitting Protection, that resulted in HTTP headers beeing not sent | ||
| 40 | |||
| 41 | Hardening Patch 0.4.7 | ||
| 42 | |||
| 43 | Fixes a problem with persistent Zend LList Canaries | ||
| 44 | Added a fix for a safe_mode bypass vulnerability in ext/curl | ||
| 45 | |||
| 46 | Hardening Patch 0.4.6 | ||
| 47 | |||
| 48 | Fixed some error situations in virtual_file_ex() | ||
| 49 | Added a dummy padding variable to work around a GCC bug | ||
| 50 | Changed Hardening-Patch’s module number | ||
| 51 | Moved HTTP Response Splitting Protection into the varfilter extension | ||
| 52 | Added protection of long superglobals against HTTP headers | ||
| 53 | Added session_id validation and creation hooks to the session extension | ||
| 54 | Backported delete old session flag from PHP 5.1 in session_regenerate_id() | ||
| 55 | Added session hooks to sqlite session handler | ||
| 56 | |||
| 57 | Hardening Patch 0.4.5 | ||
| 58 | |||
| 59 | Added fixes for ext/curl, ext/gd safe_mode/open_basedir bypass vulnerabilities | ||
| 60 | Addes an advertisement for http://www.hardened-php.net to phpinfo() | ||
| 61 | Changed that only the first forbidden variable is logged | ||
| 62 | Changed white- and blacklists to be persistent | ||
| 63 | |||
| 64 | Hardening Patch 0.4.4 | ||
| 65 | |||
| 66 | Changed the UPLOAD_ERR_FILTER numerical code | ||
| 67 | Disallow overwritting GLOBALS inside php_register_variable_ex() | ||
| 68 | Added a memory manager canary change between requests | ||
| 69 | Added more safe_mode/open_basedir checks to ext/curl, ext/gd | ||
| 70 | Added protection against ASCIIZ characters in user input | ||
| 71 | Backported some security fixes like register_globals reactivation through parse_str() | ||
| 72 | Backported a fix for memory_limit not beeing reset | ||
| 73 | |||
| 74 | Hardening Patch 0.4.3 | ||
| 75 | |||
| 76 | Added another hook for file uploads, that only checks the variablename. This also requires bumping the internal Hardening-Patch API number | ||
| 77 | Added black- and whitelist support for URL shemes in include filenames | ||
| 78 | |||
| 79 | Hardening Patch 0.4.2 | ||
| 80 | |||
| 81 | Added Solar Designer’s CRYPT_BLOWFISH implementation, to have CRYPT_BLOWFISH support in crypt() on all platforms | ||
| 82 | Added sha256() and sha256_file() functions that implement the successor of sha1 | ||
| 83 | Update to XML_RPC 1.4.0 to eliminate eval() injection vulnerability | ||
| 84 | |||
| 85 | Hardening Patch 0.4.1 | ||
| 86 | |||
| 87 | register_tick_function, register_shutdown_function callbacks recognize being set from within eval() | ||
| 88 | functions and classes registered within eval() will automatically be handled as eval()’d code if the main script calls them (f.e. through callbacks) | ||
| 89 | WARNING: the eval() function black- and whitelist do NOT protect against eval()’d code manipulating the execution flow of the main script by changing the content of variables. (Variable access black- and whitelists are sheduled for a later version) | ||
| 90 | |||
| 91 | Hardening Patch 0.4.0 | ||
| 92 | |||
| 93 | Binary compatibility with older Hardening-Patch versions again broken to ensure compatibility with APC and similiar extensions. | ||
| 94 | PHP/Zend API numbers restored to PHP originals | ||
| 95 | Additional Hardening-Patch API numbers introduced | ||
| 96 | Fixed: Access to memory manager canaries could result in not aligned memory accesses | ||
| 97 | Fixed: Only use C style comments | ||
| 98 | New Feature: Introduced whitelists and blacklists for functions, like disable_functions but configurable on a per directory basis. | ||
| 99 | New Feature: Introduced separate whitelists and blacklists for functions that are called from within eval(). | ||
| 100 | |||
| 101 | Hardening Patch v0.3.2 | ||
| 102 | |||
| 103 | Fixes a compilation error in ext/MySQLi | ||
| 104 | Fixes that without a verification script in place all fileuploads were forbidden | ||
| 105 | |||
| 106 | Hardening Patch v0.3.1 | ||
| 107 | |||
| 108 | Fixes a compilation error that exists in 0.3.0 (Thanks to Michal Lukaszek <prism@pld-linux.org >) | ||
| 109 | header() does not allow setting multiple HTTP headers at once | ||
| 110 | hphp.multiheader=On/Off controls this | ||
| 111 | Failed SQL Queries can now be logged in fbsql/mysql/mysqli/pgsql and sqlite | ||
| 112 | hphp.sql.bailout_on_error=On/Off allows termintating a script after failed queries | ||
| 113 | |||
| 114 | Hardening Patch v0.3.0 | ||
| 115 | |||
| 116 | Logging of ALERT classes can now be configured by class | ||
| 117 | Syslog facility and priority is now configurable | ||
| 118 | ALERTS can be logged by the SAPI error log | ||
| 119 | ALERTS can be logged by an external logging script | ||
| 120 | Attackers IP addresses can now be extracted from X-Forwarded-For headers | ||
| 121 | GET, POST, COOKIE variables with the following names are not registered: | ||
| 122 | GLOBALS, _COOKIE, _ENV, _FILES, _GET, _POST | ||
| 123 | _REQUEST, _SERVER, _SESSION, HTTP_COOKIE_VARS | ||
| 124 | HTTP_ENV_VARS, HTTP_GET_VARS, HTTP_POST_FILES, | ||
| 125 | HTTP_POST_VARS, HTTP_RAW_POST_DATA, | ||
| 126 | HTTP_SERVER_VARS, HTTP_SESSION_VARS | ||
| 127 | Following limits can be enforced on either COOKIE, GET and POST variables or on all REQUEST variables independent of origin | ||
| 128 | Number of variables | ||
| 129 | Maximum length of variable name [with and without indices] | ||
| 130 | Maximum length of array indices | ||
| 131 | Maximum length of variable value | ||
| 132 | Maximum depth of array | ||
| 133 | Number of uploadable files can be limited | ||
| 134 | Uploaded files can now be passed to an external verification script | ||
| 135 | Uploaded ELF files can be automatically filtered away | ||
| 136 | Execution Depth Limit | ||
| 137 | Failing SQL Queries within the MySQL extension can be logged | ||
| 138 | XML_RPC 1.3.1 replaces the vulnerable 1.2.2 | ||
| 139 | |||
| 140 | Hardening Patch v0.2.7 | ||
| 141 | |||
| 142 | backport of fixes for vulnerabilities in PHP 4.3.10 | ||
| 143 | fixes bug with open_basedir and mkdir with trailing slashes | ||
| 144 | adds safe unlink again, because canaries alone aren’t good enough | ||
| 145 | fixes non randomness of hash table canaries | ||
| 146 | |||
| 147 | Hardening Patch v0.2.6 | ||
| 148 | |||
| 149 | fixes compile problem on Solaris system | ||
| 150 | breaks binary compatibility to normal PHP by using some PHP5 structs in PHP4 | ||
| 151 | |||
| 152 | Hardening Patch v0.2.5 | ||
| 153 | |||
| 154 | no new features | ||
| 155 | fixes compile problems on some platforms | ||
| 156 | fixes the new realpath() implementation with some symlinks | ||
| 157 | |||
| 158 | Hardening Patch v0.2.4 | ||
| 159 | |||
| 160 | backported fixes for CAN-2004-1018, CAN-2004-1019, CAN-2004-1020 | ||
| 161 | and for CAN-2004-1063, CAN-2004-1064, CAN-2004-1065 | ||
| 162 | adds protection of superglobals from extract() | ||
| 163 | replaces realpath() with an implementation based on FreeBSD’s realpath() | ||
| 164 | memory_limit cannot be raised over configured limit anymore | ||
| 165 | |||
| 166 | Hardening Patch v0.2.3 | ||
| 167 | |||
| 168 | fixes problem with logging the IP from varfilter extension | ||
| 169 | fixes logging under syslog-ng | ||
| 170 | adds protection of superglobals from import_request_variables() | ||
| 171 | fixes bug within addslashes within 4.3.9 | ||
| 172 | adds logging of filename to php-security logs (does not work in all sapi yet) | ||
| 173 | increases maximum length of a variable to 10000 within varfilter | ||
| 174 | adds HARDENED_PHP and HARDENED_PHP_VERSION constants | ||
| 175 | |||
| 176 | Hardening Patch v0.2.2 fixes | ||
| 177 | |||
| 178 | incompatibility between some configurations and HashTable Destructor protection | ||
| 179 | |||
| 180 | Hardening Patch v0.2.1 fixes | ||
| 181 | |||
| 182 | compile problem with ext/mbstring | ||
| 183 | Basic Auth problem in PHP 5.0.0 | ||
| 184 | |||
| 185 | Hardening Patch v0.2.0 adds | ||
| 186 | |||
| 187 | all security fixes from PHP 4.3.8 for PHP 4.3.7 users | ||
| 188 | Canary protection of Zend HashTable destructors | ||
| 189 | Backport of PHP5’s input_filter technology | ||
| 190 | Hardening Patch’s varfilter extension | ||
| 191 | |||
| 192 | Hardening Patch v0.1.2 adds | ||
| 193 | |||
| 194 | PHP5 compatibility (non ZTS) | ||
| 195 | full ZTS compatibility | ||
| 196 | and some other small fixes | ||
| 197 | |||
| 198 | Hardening Patch v0.1.1 adds | ||
| 199 | |||
| 200 | memory_limit check relocation | ||
| 201 | and some other small fixes | ||
| 202 | |||
| 203 | Hardening Patch v0.1.0 implements | ||
| 204 | |||
| 205 | Canary protection of the Zend Memory Manager | ||
| 206 | Canary protection of Zend Linked Lists | ||
| 207 | Protection against internal format string exploits | ||
| 208 | Protection against arbitrary code inclusion | ||
| 209 | Syslog logging of attackers IP | ||
| 210 | |||
| 211 | |||
