GNU bug report logs

#27808 PHP CVE-2017-11144, CVE-2017-11145, CVE-2017-11362

PackageSource(s)Maintainer(s)
guix PTS Buildd Popcon
Full log

Message #17 received at 27808@debbugs.gnu.org (full text, mbox, reply):

Received: (at 27808) by debbugs.gnu.org; 31 Jul 2017 15:32:25 +0000
From debbugs-submit-bounces@debbugs.gnu.org Mon Jul 31 11:32:25 2017
Received: from localhost ([127.0.0.1]:35549 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces@debbugs.gnu.org>)
	id 1dcCgC-0006lO-UL
	for submit@debbugs.gnu.org; Mon, 31 Jul 2017 11:32:25 -0400
Received: from eggs.gnu.org ([208.118.235.92]:34473)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <ludo@gnu.org>) id 1dcCgB-0006l8-GL
 for 27808@debbugs.gnu.org; Mon, 31 Jul 2017 11:32:23 -0400
Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71)
 (envelope-from <ludo@gnu.org>) id 1dcCg5-0006oI-8T
 for 27808@debbugs.gnu.org; Mon, 31 Jul 2017 11:32:18 -0400
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org
X-Spam-Level: 
X-Spam-Status: No, score=-0.0 required=5.0 tests=BAYES_40,RP_MATCHES_RCVD
 autolearn=disabled version=3.3.2
Received: from fencepost.gnu.org ([2001:4830:134:3::e]:55310)
 by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from <ludo@gnu.org>)
 id 1dcCg5-0006oA-5N; Mon, 31 Jul 2017 11:32:17 -0400
Received: from [193.50.110.251] (port=37108 helo=ribbon)
 by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256)
 (Exim 4.82) (envelope-from <ludo@gnu.org>)
 id 1dcCg4-0001OU-Lc; Mon, 31 Jul 2017 11:32:17 -0400
From: ludo@gnu.org (Ludovic Courtès)
To: Alex Sassmannshausen <alex@pompo.co>
Subject: Re: [bug#27826] bug#27808: PHP CVE-2017-11144, CVE-2017-11145,
 CVE-2017-11362
References: <20170724185744.GA4997@jasmine.lan> <87k22wo7v8.fsf@pompo.co>
 <20170725184153.GA24552@jasmine.lan> <87inignvxw.fsf@pompo.co>
Date: Mon, 31 Jul 2017 17:32:14 +0200
In-Reply-To: <87inignvxw.fsf@pompo.co> (Alex Sassmannshausen's message of
 "Tue, 25 Jul 2017 21:44:11 +0200")
Message-ID: <87379c39mp.fsf@gnu.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.2 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic]
X-Received-From: 2001:4830:134:3::e
X-Spam-Score: -5.0 (-----)
X-Debbugs-Envelope-To: 27808
Cc: 27826@debbugs.gnu.org, 27808@debbugs.gnu.org,
 Leo Famulari <leo@famulari.name>
X-BeenThere: debbugs-submit@debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit@debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request@debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces@debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org>
X-Spam-Score: -5.0 (-----)
Hi Alex,

Alex Sassmannshausen <alex@pompo.co> skribis:

>> On Tue, Jul 25, 2017 at 05:26:35PM +0200, Alex Sassmannshausen wrote:
>>> Hi Leo,
>>> 
>>> I've just submitted a patch to update PHP to version 7.1.7, which
>>> resolves the CVEs. Unfortunately PHP has 4 test errors on my machine
>>> (but also on the previous version), so I could not fully build it
>>> (disabling tests results in a working version of PHP).
>>
>> I got this building with that patch:
>>
>> =====================================================================
>> FAILED TEST SUMMARY
>> ---------------------------------------------------------------------
>> Test for DateTime::modify() with absolute time statements [ext/date/tests/date-time-modify-times.phpt]
>> Bug #74435 (Buffer over-read into uninitialized memory) [ext/gd/tests/bug74435.phpt]
>> Bug #70436: Use After Free Vulnerability in unserialize() [ext/standard/tests/strings/bug70436.phpt]
>> Bug #72663: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization [ext/standard/tests/strings/bug72663_3.phpt]
>> =====================================================================
>
> OK that's what I've got too.
>
> I guess it will need some investigation… :-(

Any update?  :-)

Would be good not to leave the vulnerable version in the distro.

TIA,
Ludo’.




Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Sun Dec 22 12:28:52 2024; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.