|
Message-ID: <CA+KTh2wQ2x4mx5LniqyjMB98kTsHO4N9d6gWoowbEehn15XSrg@mail.gmail.com> Date: Thu, 19 Mar 2015 08:31:14 +1300 From: Emmanuel Law <emmanuel.law@...il.com> To: Timo Warns <Timo.Warns@...il.com> Cc: tk@...a.or.at, oss-security@...ts.openwall.com Subject: Re: CVE Request: ZIP Integer Overflow leads to writing past heap boundary Yup we realised that and notified libzip. On 19/03/2015 8:05 am, "Timo Warns" <Timo.Warns@...il.com> wrote: > On 2015-03-18, Emmanuel Law wrote: > > found an integer overflow in PHP. When processing a malform zip file with > > many entires, it leads to a heap overflow. > > > > Affected Version <= PHP 5.6.6 > > Bug Report: https://bugs.php.net/bug.php?id=69253 > > Patch: > > > https://github.com/php/php-src/commit/ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5 > > This looks like it may also affect libzip upstream > (http://hg.nih.at/libzip/file/fa78ab51417f/lib/zip_dirent.c) > > Was upstream (in copy) informed about the issue? > > Cheers, Timo >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.