Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 19 Mar 2015 09:24:47 +1300
From: Emmanuel Law <emmanuel.law@...il.com>
To: Timo Warns <Timo.Warns@...il.com>
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Re: CVE Request: ZIP Integer Overflow leads to
 writing past heap boundary

It covers both PHP and libizp.

I realised libzip was vulnerable only after the Request for CVE. My bad :(

Either way I've informed upstream libzip about the issue.

On Thu, Mar 19, 2015 at 9:24 AM, Timo Warns <Timo.Warns@...il.com> wrote:

> On 2015-03-18, cve-assign@...re.org wrote:
> >
> > > https://bugs.php.net/bug.php?id=69253
> > >
> https://github.com/php/php-src/commit/ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5
> >
> > > PHP <= 5.6.6 has a Integer overflow vulnerability when opening a
> > > ZipArchive with a large number of entries. This results in writing
> > > past the heap boundary and crashing PHP.
> >
> > Use CVE-2015-2331.
>
> Can you please clarify the scope of CVE-2015-2331? Does it only cover
> the vulnerability in PHP or does it also cover upstream libzip?
>
> Thanks, Timo
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.