Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (segmentation fault triggered by out-of-bond memory read) via a specially crafted manifest entry in a PHAR archive. Upstream bug: https://bugs.php.net/bug.php?id=73764 Upstream patch: https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93
Created php tracking bugs for this issue: Affects: fedora-all [bug 1419021]
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Via RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2018:1296