|
Message-Id: <20150315173739.6DCCA6C0017@smtpvmsrv1.mitre.org> Date: Sun, 15 Mar 2015 13:37:39 -0400 (EDT) From: cve-assign@...re.org To: falonsoe@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, oss@...ernot.info Subject: Re: CVE Request: PHP 5.6.6 changelog -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > [1] PHP: heap buffer overflow in enchant_broker_request_dict() > https://bugs.php.net/bug.php?id=68552 > http://svn.php.net/viewvc/pecl/enchant/trunk/enchant.c?r1=317600&r2=335803 > https://bugzilla.redhat.com/show_bug.cgi?id=1194737 > AddressSanitizer: heap-buffer-overflow ... > WRITE of size 4 Use CVE-2014-9705. > [3] PHP: use after free in phar_object.c > https://bugs.php.net/bug.php?id=68901 > http://git.php.net/?p=php-src.git;a=commit;h=b2cf3f064b8f5efef89bb084521b61318c71781b > https://bugzilla.redhat.com/show_bug.cgi?id=1194747 The bug report refers to this version of the code: https://raw.githubusercontent.com/php/php-src/ad32e033274ea49d05164418241946d2f1798894/ext/phar/phar_object.c newpath = oldpath; goto its_ok; with its_ok: if (SUCCESS == php_stream_stat_path(newpath, &ssb)) { efree(oldpath); zend_throw_exception_ex(spl_ce_BadMethodCallException, 0, "phar \"%s\" exists and must be unlinked prior to conversion", newpath); Use CVE-2015-2301. > [2] PHP: Double free with disabled ZMM > https://bugs.php.net/bug.php?id=68827 > http://git.php.net/?p=php-src.git;a=commit;h=91aa340180eccfc15d4a143b54d47b8120f898be > https://bugzilla.redhat.com/show_bug.cgi?id=1194741 This apparently ended with: [2015-01-14 12:53 UTC] tony2001@....net -Type: Security +Type: Feature/Change Request There is no CVE ID. It is potentially confusing because the commit uses the original title of the bug report, but the "[2015-01-14 12:33 UTC]" comment suggests that a double free is impossible. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVBcL4AAoJEKllVAevmvmsEKgIAJCwBXEfUNPaaHiICHkgcd4h 6Epeh3412VAiiDqtg8hbs8DKIpGvKdxP45mehyGO0mrEqcDwwT/+vTOJcWlVvoOp IzzFwjiTlrY8vdaWuaCw0V/n8ybHYIsocUhyLJiO067b7XPwmDSWZGT35dFAXyQD eAvPQEcgWxCDKuqCwixPse4s48wUCNwsVFSunPkNQRSeeeQW5Ou6exohmNmD6O07 3n6BuikB9Z/iXrP650hxZSEaFJNBKpFx0mCsuRhKW975qa5Pa1qkE5O41N/PHLjL Z0isZ5r73GuLnO4ZUv5QVfnePhp+aHCPfaRh38DQgbarDmTSCjOX1o0mi2ubox0= =flzX -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.