|
Message-Id: <20160224193156.848ECB2E070@smtpvbsrv1.mitre.org> Date: Wed, 24 Feb 2016 14:31:56 -0500 (EST) From: cve-assign@...re.org To: hji@...topia.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: php: stack overflow when decompressing tar archives -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > issue which may be of > interest to anybody shipping PHP older than 5.5.32, 5.6.18 or 7.0.3 > without FORTIFY: > > https://bugs.php.net/bug.php?id=71488 (Just for simplicity, the following comments only mention PHP 7.x - there may be analogous statements about PHP 5.x. This does not mean that a PHP 5.x issue from 71488 has a different CVE ID.) Use CVE-2016-2554 for the issue that was fixed in the 7.0.3 release. We understand that this was in the: http://git.php.net/?p=php-src.git;a=commit;h=07c7df68bd68bbe706371fccc77c814ebb335d9e commit. This commit has most of the changes that were made in ext/phar/tar.c between the 7.0.2 release and the 7.0.3 release. There was also a change from "if (entry.filename_len == UINT_MAX)" to "if (entry.filename_len == UINT_MAX || entry.filename_len == 0)" that may be unrelated. The "2016-02-01 15:01 UTC" comment in 71488 seems to discuss an additional concern. If there is a remaining vulnerability that was not fixed in 7.0.3, that vulnerability is not covered by the CVE-2016-2554 ID. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWzgR/AAoJEL54rhJi8gl5yOsP/A/7iIQnhsYqIUyBBNf6f9xs 8Tyo9X0zvp+Bz0IkiqIjwVkqRHc5wCxlsGK79L+nXVdByZfV39ifkmRjlQmMFSqQ WOeHmMfnRowVbeQ/H/2PcnBIPxibVa0Q0bsRpCBZhftoGeKZl+1gVT3MPa1Cy20U m/PNKDHgpcE2Lf3C8mRCOPHOW/rTixIoslWx6y8791whIb+pthhiCSHISSx/JtES a1U5IJxte5dO1jJbE7326iO5PWrpIp1O23pUjo361+90oetUyIM1CKr2eNvnuLgO yeQNMrB5byNZLdwLygKMcRXlXmFYIQdzSPICcx7VJVrCRT52go7oAcIUjX7eMGwj CtesDMcMFG89phT6KjyPpoTNcYbxbGnkW4X6xFfSxEydWxmbU8jlREY9ZkW9VByz ylXfz4jxGzjnDP+chxi0YjCTf6rAtO8wdUwcofrj9zd2g7IXre0ZXETUw3Agbj0w CPkJxvZTNYJ58bo8QPaHRU1Gf4ZeSLuqmjQRrrIugQRVbS8tC5jsSgljDtTCXItw yERkYr5zK5dAdcfxcVIbg/O2rJLis3x9DXOHrAmJhKbH6vt8QKGV3vIy9rZ2ZZOx Wtb8SijhbGwb3C9ZMO6aYmT0q483Dpw1pRd9DgkNzkDNunN3qF2CSTV/xT8qVqyz U5FwJlkLo7BXcPqar61M =hnVy -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.