openbsd-ports/lang/php/5.2/distinfo
sthen 7ed8f39ef4 Update the Suhosin extension to 0.9.33 fixing CVE-2012-0807.
Stack overflow, only affects a very specific and unusual non-default
configuration: transparent cookie encryption enabled, HTTP response
splitting protection disabled, *and* a PHP application must allow
unfiltered user input to header() in order to be affected.

Good write-up at http://seclists.org/fulldisclosure/2012/Jan/295
ok robert@
2012-01-25 11:17:22 +00:00

16 lines
915 B
Plaintext

MD5 (php-5.2.17.tar.gz) = BNMh1a6506BRIz29JCIO8Q==
MD5 (suhosin-0.9.33.tgz) = DOSYoCqCgeQnTqjjkMK0hw==
MD5 (suhosin-patch-5.2.16-0.9.7.patch.gz) = 2BX8maDCXCH13yhVH8uwAQ==
RMD160 (php-5.2.17.tar.gz) = bEdlNlRfCa/MtAHcNd4vjcxYxRE=
RMD160 (suhosin-0.9.33.tgz) = nGC2lbIm3cvlVisVdiKHgBI+s3I=
RMD160 (suhosin-patch-5.2.16-0.9.7.patch.gz) = sotw+vE2s+BMW0g9oPTCJ5N49Do=
SHA1 (php-5.2.17.tar.gz) = W6fty16hh2hwAcTM27lKxI93+pI=
SHA1 (suhosin-0.9.33.tgz) = q7MMIuf+NBlVtC7HHtWXxDQ54rg=
SHA1 (suhosin-patch-5.2.16-0.9.7.patch.gz) = /sELK4FYLQa7DQqW6lXFJa/Iqyk=
SHA256 (php-5.2.17.tar.gz) = Gr4Hwf3WQYRwijuheavPzKVmKk4NIDfrJ0i3WrxC52c=
SHA256 (suhosin-0.9.33.tgz) = hlsccrrppacQ/gsHoGNVVs5sg4ZT7DZNKipub1lFKcU=
SHA256 (suhosin-patch-5.2.16-0.9.7.patch.gz) = quEVoxjYCz8yzt+HbnqOS5Mv67Gwx0PAs5gAPr4SL5E=
SIZE (php-5.2.17.tar.gz) = 11801597
SIZE (suhosin-0.9.33.tgz) = 104488
SIZE (suhosin-patch-5.2.16-0.9.7.patch.gz) = 23069