Date: Fri, 17 Jul 2015 15:54:25 +0200 From: Vasyl Kaigorodov <vkaigoro@...hat.com> To: oss-security@...ts.openwall.com Cc: security@....net, cve-assign@...re.org Subject: CVE request: php - segmentation fault in Phar::convertToData; buffer overflow in phar_fix_filepath; Hello, I'd like to request a CVEs for the below issues fixed in PHP 5.5.27 and 5.4.43 (5.6.x was not affected by those it looks like): Segfault in Phar::convertToData on invalid file https://bugs.php.net/bug.php?id=69958 http://git.php.net/?p=php-src.git;a=commit;h=bf58162ddf970f63502837f366930e44d6a992cf Buffer overflow and stack smashing error in phar_fix_filepath https://bugs.php.net/bug.php?id=69923 http://git.php.net/?p=php-src.git;a=commit;h=6dedeb40db13971af45276f80b5375030aa7e76f Thanks. -- Vasyl Kaigorodov | Red Hat Product Security PGP: 0xABB6E828 A7E0 87FF 5AB5 48EB 47D0 2868 217B F9FC ABB6 E828 Free/Busy status: https://url.corp.redhat.com/vk-free-busy-status Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.