Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150717135425.GB19821@mail.corp.redhat.com>
Date: Fri, 17 Jul 2015 15:54:25 +0200
From: Vasyl Kaigorodov <vkaigoro@...hat.com>
To: oss-security@...ts.openwall.com
Cc: security@....net, cve-assign@...re.org
Subject: CVE request: php - segmentation fault in Phar::convertToData; buffer
 overflow in phar_fix_filepath;

Hello,

I'd like to request a CVEs for the below issues fixed in PHP 5.5.27 and 5.4.43 (5.6.x was not affected by those it looks like):

Segfault in Phar::convertToData on invalid file
https://bugs.php.net/bug.php?id=69958
http://git.php.net/?p=php-src.git;a=commit;h=bf58162ddf970f63502837f366930e44d6a992cf

Buffer overflow and stack smashing error in phar_fix_filepath
https://bugs.php.net/bug.php?id=69923
http://git.php.net/?p=php-src.git;a=commit;h=6dedeb40db13971af45276f80b5375030aa7e76f

Thanks.
-- 
Vasyl Kaigorodov | Red Hat Product Security
PGP:  0xABB6E828 A7E0 87FF 5AB5 48EB 47D0 2868 217B F9FC ABB6 E828
Free/Busy status: https://url.corp.redhat.com/vk-free-busy-status

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.