GNU bug report logs

#27808 PHP CVE-2017-11144, CVE-2017-11145, CVE-2017-11362

PackageSource(s)Maintainer(s)
guix PTS Buildd Popcon
Full log

Message #30 received at 27808-done@debbugs.gnu.org (full text, mbox, reply):

Received: (at 27808-done) by debbugs.gnu.org; 20 Aug 2017 20:11:22 +0000
From debbugs-submit-bounces@debbugs.gnu.org Sun Aug 20 16:11:22 2017
Received: from localhost ([127.0.0.1]:46962 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces@debbugs.gnu.org>)
	id 1djWZ8-0005nm-5c
	for submit@debbugs.gnu.org; Sun, 20 Aug 2017 16:11:22 -0400
Received: from mail.pompo.co ([87.243.223.35]:59627 helo=ronja.pompo.co)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <alex@pompo.co>)
 id 1djWZ6-0005nU-HC; Sun, 20 Aug 2017 16:11:20 -0400
Received: from hypatia (host81-158-26-86.range81-158.btcentralplus.com
 [81.158.26.86])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ronja.pompo.co (Postfix) with ESMTPSA id 70E95402E5;
 Sun, 20 Aug 2017 20:11:14 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pompo.co; s=mail;
 t=1503259874; bh=uXTiy7w5ldozf1mm3OCzY3kv481SU35wOFIKGE8seKc=;
 h=References:From:To:Subject:Reply-To:In-reply-to:Date:From;
 b=ZO/LRAZ9iUxUwByYh68RBTZD1RQqGIw1GZyWfHJ1InSGH13N6UwVNsWayt1b8E0CT
 z6kAIeRN2m2rDVnG1+k7smqBubKO7BGHUlnw/NWMrw/6BzR6QHMRB1frNHoaB/9Gy1
 5T8vsNKymyZr6l+GagBkU8X1wPkyOtVWER5TuTrQ=
References: <20170724185744.GA4997@jasmine.lan> <87k22wo7v8.fsf@pompo.co>
 <20170725184153.GA24552@jasmine.lan> <87inignvxw.fsf@pompo.co>
 <87379c39mp.fsf@gnu.org> <87k22ok24j.fsf@pompo.co>
User-agent: mu4e 0.9.18; emacs 25.2.1
From: Alex Sassmannshausen <alex@pompo.co>
To: 27826-done@debbugs.gnu.org, 27808-done@debbugs.gnu.org
Subject: Re: [bug#27826] bug#27808: PHP CVE-2017-11144, CVE-2017-11145,
 CVE-2017-11362
In-reply-to: <87k22ok24j.fsf@pompo.co>
Date: Sun, 20 Aug 2017 22:11:13 +0200
Message-ID: <87efs6uhi6.fsf@pompo.co>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Spam-Score: 0.0 (/)
X-Debbugs-Envelope-To: 27808-done
X-BeenThere: debbugs-submit@debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit@debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request@debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=subscribe>
Reply-To: alex@pompo.co
Errors-To: debbugs-submit-bounces@debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org>
X-Spam-Score: 0.0 (/)
Closing as resolved in commit 1cec3462323717e063c98b6404e9c5c5ef037bdd.

Alex

Alex Sassmannshausen writes:

> Ludovic Courtès writes:
>
>> Hi Alex,
>>
>> Alex Sassmannshausen <alex@pompo.co> skribis:
>>
>>>> On Tue, Jul 25, 2017 at 05:26:35PM +0200, Alex Sassmannshausen wrote:
>>>>> Hi Leo,
>>>>>
>>>>> I've just submitted a patch to update PHP to version 7.1.7, which
>>>>> resolves the CVEs. Unfortunately PHP has 4 test errors on my machine
>>>>> (but also on the previous version), so I could not fully build it
>>>>> (disabling tests results in a working version of PHP).
>>>>
>>>> I got this building with that patch:
>>>>
>>>> =====================================================================
>>>> FAILED TEST SUMMARY
>>>> ---------------------------------------------------------------------
>>>> Test for DateTime::modify() with absolute time statements [ext/date/tests/date-time-modify-times.phpt]
>>>> Bug #74435 (Buffer over-read into uninitialized memory) [ext/gd/tests/bug74435.phpt]
>>>> Bug #70436: Use After Free Vulnerability in unserialize() [ext/standard/tests/strings/bug70436.phpt]
>>>> Bug #72663: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization [ext/standard/tests/strings/bug72663_3.phpt]
>>>> =====================================================================
>>>
>>> OK that's what I've got too.
>>>
>>> I guess it will need some investigation… :-(
>>
>> Any update?  :-)
>>
>> Would be good not to leave the vulnerable version in the distro.
>
> Agreed, though I am in no position to investigate this. I was going to
> propose a patch that disabled those 4 tests, but I will need to
> investigate how to do that.  So at the earliest I could contribute those
> patches this weekend.
>
> Alex
>
>>
>> TIA,
>> Ludo’.





Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Sun Dec 22 12:51:48 2024; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.