Bug 1271088 (CVE-2015-7804) - CVE-2015-7804 php: uninitialized pointer in phar_make_dirstream()
Summary: CVE-2015-7804 php: uninitialized pointer in phar_make_dirstream()
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2015-7804
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1305850 1305851
Blocks: 1271092 1306180
TreeView+ depends on / blocked
 
Reported: 2015-10-13 07:18 UTC by Martin Prpič
Modified: 2019-12-16 05:01 UTC (History)
7 users (show)

Fixed In Version: php 5.6.14, php 5.5.30
Clone Of:
Environment:
Last Closed: 2015-11-24 08:49:58 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:0457 0 normal SHIPPED_LIVE Moderate: rh-php56-php security update 2016-03-16 00:55:18 UTC

Description Martin Prpič 2015-10-13 07:18:45 UTC
An uninitialized pointer use flaw was found in the phar_make_dirstream() function of PHP's Phar extension. A specially crafted phar file in the ZIP format with a directory entry with a file name "/ZIP" could cause a PHP application function to crash.

Upstream bug:

https://bugs.php.net/bug.php?id=70433

Upstream patch:

https://git.php.net/?p=php-src.git;a=patch;h=e78ac461dbefb7c4a3e9fde78d50fbc56b7b0183

Comment 1 Martin Prpič 2015-10-13 07:20:02 UTC
Fixed in all versions of Fedora:

php-5.6.14-1.fc21
php-5.6.14-1.fc22
php-5.6.14-1.fc23
php-5.6.14-1.fc24

Comment 6 errata-xmlrpc 2016-03-15 20:58:02 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 6

Via RHSA-2016:0457 https://rhn.redhat.com/errata/RHSA-2016-0457.html


Note You need to log in before you can comment on or make changes to this bug.