![oss-sec logo](/images/oss-sec-logo.png)
oss-sec mailing list archives
Re: CVE Request: PHP 5.6.6 changelog
From: cve-assign () mitre org
Date: Sun, 15 Mar 2015 13:37:39 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[1] PHP: heap buffer overflow in enchant_broker_request_dict() https://bugs.php.net/bug.php?id=68552 http://svn.php.net/viewvc/pecl/enchant/trunk/enchant.c?r1=317600&r2=335803 https://bugzilla.redhat.com/show_bug.cgi?id=1194737
AddressSanitizer: heap-buffer-overflow ... WRITE of size 4
Use CVE-2014-9705.
[3] PHP: use after free in phar_object.c https://bugs.php.net/bug.php?id=68901 http://git.php.net/?p=php-src.git;a=commit;h=b2cf3f064b8f5efef89bb084521b61318c71781b https://bugzilla.redhat.com/show_bug.cgi?id=1194747
The bug report refers to this version of the code: https://raw.githubusercontent.com/php/php-src/ad32e033274ea49d05164418241946d2f1798894/ext/phar/phar_object.c newpath = oldpath; goto its_ok; with its_ok: if (SUCCESS == php_stream_stat_path(newpath, &ssb)) { efree(oldpath); zend_throw_exception_ex(spl_ce_BadMethodCallException, 0, "phar \"%s\" exists and must be unlinked prior to conversion", newpath); Use CVE-2015-2301.
[2] PHP: Double free with disabled ZMM https://bugs.php.net/bug.php?id=68827 http://git.php.net/?p=php-src.git;a=commit;h=91aa340180eccfc15d4a143b54d47b8120f898be https://bugzilla.redhat.com/show_bug.cgi?id=1194741
This apparently ended with: [2015-01-14 12:53 UTC] tony2001 () php net -Type: Security +Type: Feature/Change Request There is no CVE ID. It is potentially confusing because the commit uses the original title of the bug report, but the "[2015-01-14 12:33 UTC]" comment suggests that a double free is impossible. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVBcL4AAoJEKllVAevmvmsEKgIAJCwBXEfUNPaaHiICHkgcd4h 6Epeh3412VAiiDqtg8hbs8DKIpGvKdxP45mehyGO0mrEqcDwwT/+vTOJcWlVvoOp IzzFwjiTlrY8vdaWuaCw0V/n8ybHYIsocUhyLJiO067b7XPwmDSWZGT35dFAXyQD eAvPQEcgWxCDKuqCwixPse4s48wUCNwsVFSunPkNQRSeeeQW5Ou6exohmNmD6O07 3n6BuikB9Z/iXrP650hxZSEaFJNBKpFx0mCsuRhKW975qa5Pa1qkE5O41N/PHLjL Z0isZ5r73GuLnO4ZUv5QVfnePhp+aHCPfaRh38DQgbarDmTSCjOX1o0mi2ubox0= =flzX -----END PGP SIGNATURE-----
Current thread:
- CVE Request: PHP 5.6.6 changelog Francisco Alonso (Mar 10)
- Re: CVE Request: PHP 5.6.6 changelog Francisco Alonso (Mar 11)
- Re: Re: CVE Request: PHP 5.6.6 changelog Joshua Rogers (Mar 11)
- Re: CVE Request: PHP 5.6.6 changelog cve-assign (Mar 15)
- Re: CVE Request: PHP 5.6.6 changelog Francisco Alonso (Mar 11)