Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 5 Jul 2017 14:37:00 +0300
From: Lior Kaplan <>
Cc: "" <>,
Subject: CVE IDs needed for PHP vulnerabilites (affects 5.6.30 and 7.0.20)


The following issues have been reported and fixed in PHP. At the moment
they are part of PHP 7.0.21 release. The fixes are also included in the 5.6
branch and will be part of 5.6.31 when it will be released.

#73807 Performance problem with processing post request over 2000000 chars;a=commitdiff;h=0f8cf3b8497dc45c010c44ed9e96518e11e19fc3

#74145 wddx parsing empty boolean tag leads to SIGSEGV;a=commitdiff;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7;a=commitdiff;h=f269cdcd4f76accbecd03884f327cffb9a7f1ca9

#74651 negative-size-param (-1) in memcpy in zif_openssl_seal();a=commitdiff;h=89637c6b41b510c20d262c17483f582f115c66d6

#74819 wddx_deserialize() heap out-of-bound read via php_parse_date()
PHP 5.6 -;a=commitdiff;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
PHP 7.0  -;a=commitdiff;h=6b18d956de38ecd8913c3d82ce96eb0368a1f9e5

Also, requests from past releases:

PHP 5.6.28 + 7.0.13
#73192 parse_url return wrong hostname;a=commitdiff;h=b061fa909de77085d3822a89ab901b934d0362c4

5.6.30 + 7.0.15
#73773 Seg fault when loading hostile phar;a=commitdiff;h=e5246580a85f031e1a3b8064edbaa55c1643a451

Lior Kaplan
PHP security team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.