CVE-2019-9675
Published: 11 March 2019
** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."
Notes
Author | Note |
---|---|
mdeslaur | released in USN-3922-1, ommited from text |
Priority
CVSS 3 base score: 8.1
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
precise |
Released
(5.3.10-1ubuntu3.34)
|
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.29)
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
php7.0 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(7.0.33-0ubuntu0.16.04.3)
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699 (7.1) |
||
php7.2 Launchpad, Ubuntu, Debian |
bionic |
Released
(7.2.15-0ubuntu0.18.04.2)
|
cosmic |
Released
(7.2.15-0ubuntu0.18.10.2)
|
|
disco |
Released
(7.2.15-0ubuntu3)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(7.2.16)
|
|
xenial |
Does not exist
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699 |
||
php7.3 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(7.3.3)
|
|
xenial |
Does not exist
|