Description
** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x
before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer
overflow via a long link value. NOTE: The vendor indicates that the link
value is used only when an archive contains a symlink, which currently
cannot happen: "This issue allows theoretical compromise of security, but a
practical attack is usually impossible."
Notes
mdeslaur | released in USN-3922-1, ommited from text |
Package
Upstream: | needs-triage
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(5.5.9+dfsg-1ubuntu4.29)
|
Patches:
Package
Upstream: | needs-triage
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 16.04 ESM: | released
(7.0.33-0ubuntu0.16.04.3)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(7.2.16)
|
Ubuntu 18.04 LTS: | released
(7.2.15-0ubuntu0.18.04.2)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(7.3.3)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 14:01:34 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)