CVE-2019-9675

Priority
Description
** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x
before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer
overflow via a long link value. NOTE: The vendor indicates that the link
value is used only when an archive contains a symlink, which currently
cannot happen: "This issue allows theoretical compromise of security, but a
practical attack is usually impossible."
Assigned-to
mdeslaur
Notes
mdeslaurreleased in USN-3922-1, ommited from text
Package
Source: php5 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:released (5.5.9+dfsg-1ubuntu4.29)
Patches:
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:DNE
Ubuntu 16.04 ESM:released (7.0.33-0ubuntu0.16.04.3)
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699 (7.1)
Package
Upstream:released (7.2.16)
Ubuntu 18.04 LTS:released (7.2.15-0ubuntu0.18.04.2)
Ubuntu 14.04 ESM:DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699
Package
Upstream:released (7.3.3)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-04-13 14:01:34 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)