Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEsznC6vAOzM9wmtcZwiLX1-k3uevMEEuxkksXCUMR8=hsq+Kg@mail.gmail.com>
Date: Wed, 5 Jul 2017 14:37:00 +0300
From: Lior Kaplan <kaplanlior@...il.com>
To: cve-assign@...re.org
Cc: "security@....net" <security@....net>, oss-security@...ts.openwall.com
Subject: CVE IDs needed for PHP vulnerabilites (affects 5.6.30 and 7.0.20)

Hi,

The following issues have been reported and fixed in PHP. At the moment
they are part of PHP 7.0.21 release. The fixes are also included in the 5.6
branch and will be part of 5.6.31 when it will be released.

#73807 Performance problem with processing post request over 2000000 chars
https://bugs.php.net/bug.php?id=73807
http://git.php.net/?p=php-src.git;a=commitdiff;h=0f8cf3b8497dc45c010c44ed9e96518e11e19fc3

#74145 wddx parsing empty boolean tag leads to SIGSEGV
https://bugs.php.net/bug.php?id=74145
http://git.php.net/?p=php-src.git;a=commitdiff;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
http://git.php.net/?p=php-src.git;a=commitdiff;h=f269cdcd4f76accbecd03884f327cffb9a7f1ca9

#74651 negative-size-param (-1) in memcpy in zif_openssl_seal()
https://bugs.php.net/bug.php?id=74651
http://git.php.net/?p=php-src.git;a=commitdiff;h=89637c6b41b510c20d262c17483f582f115c66d6

#74819 wddx_deserialize() heap out-of-bound read via php_parse_date()
https://bugs.php.net/bug.php?id=74819
PHP 5.6 -
http://git.php.net/?p=php-src.git;a=commitdiff;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
PHP 7.0  -
http://git.php.net/?p=php-src.git;a=commitdiff;h=6b18d956de38ecd8913c3d82ce96eb0368a1f9e5

Also, requests from past releases:

PHP 5.6.28 + 7.0.13
#73192 parse_url return wrong hostname
https://bugs.php.net/bug.php?id=73192
http://git.php.net/?p=php-src.git;a=commitdiff;h=b061fa909de77085d3822a89ab901b934d0362c4

5.6.30 + 7.0.15
#73773 Seg fault when loading hostile phar
https://bugs.php.net/bug.php?id=73773
http://git.php.net/?p=php-src.git;a=commitdiff;h=e5246580a85f031e1a3b8064edbaa55c1643a451

Thanks,
Lior Kaplan
PHP security team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.