An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible." Upstream Bug: https://bugs.php.net/bug.php?id=77586 Upstream Patch: http://git.php.net/?p=php-src.git;a=commitdiff;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699
Created php tracking bugs for this issue: Affects: fedora-all [bug 1688948]
This is not a real flaw for now, as the code cannot be reached as stated by upstream.
See https://bugs.php.net/bug.php?id=65332 "phar follows symlinks instead of adding them".
Statement: Red Hat Product Security determined that this flaw was not a security vulnerability. See the Bugzilla link for more details.