php7.3: CVE-2019-11036

Related Vulnerabilities: CVE-2019-11036  

Debian Bug report logs - #928421
php7.3: CVE-2019-11036

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sat, 4 May 2019 08:48:02 UTC

Severity: important

Tags: fixed-upstream, security, upstream

Found in version php7.3/7.3.4-2

Fixed in version php7.3/7.3.6-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Forwarded to https://bugs.php.net/bug.php?id=77950

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian PHP Maintainers <team+pkg-php@tracker.debian.org>:
Bug#928421; Package src:php7.3. (Sat, 04 May 2019 08:48:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian PHP Maintainers <team+pkg-php@tracker.debian.org>. (Sat, 04 May 2019 08:48:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: php7.3: CVE-2019-11036
Date: Sat, 04 May 2019 10:46:24 +0200
Source: php7.3
Version: 7.3.4-2
Severity: important
Tags: security upstream
Forwarded: https://bugs.php.net/bug.php?id=77950

Hi,

The following vulnerability was published for php7.3.

CVE-2019-11036[0]:
| When processing certain files, PHP EXIF extension in versions 7.1.x
| below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused
| to read past allocated buffer in exif_process_IFD_TAG function. This
| may lead to information disclosure or crash.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11036
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036
[1] https://bugs.php.net/bug.php?id=77950

Regards,
Salvatore



Added tag(s) fixed-upstream. Request was from debian-bts-link@lists.debian.org to control@bugs.debian.org. (Thu, 09 May 2019 19:30:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian PHP Maintainers <team+pkg-php@tracker.debian.org>:
Bug#928421; Package src:php7.3. (Fri, 31 May 2019 20:15:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian PHP Maintainers <team+pkg-php@tracker.debian.org>. (Fri, 31 May 2019 20:15:03 GMT) (full text, mbox, link).


Message #12 received at 928421@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 928421@bugs.debian.org
Cc: 928421-done@bugs.debian.org
Subject: Re: Bug#928421: php7.3: CVE-2019-11036
Date: Fri, 31 May 2019 22:10:13 +0200
Source: php7.3
Source-Version: 7.3.6-1

On Sat, May 04, 2019 at 10:46:24AM +0200, Salvatore Bonaccorso wrote:
> Source: php7.3
> Version: 7.3.4-2
> Severity: important
> Tags: security upstream
> Forwarded: https://bugs.php.net/bug.php?id=77950
> 
> Hi,
> 
> The following vulnerability was published for php7.3.
> 
> CVE-2019-11036[0]:
> | When processing certain files, PHP EXIF extension in versions 7.1.x
> | below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused
> | to read past allocated buffer in exif_process_IFD_TAG function. This
> | may lead to information disclosure or crash.

This issue was fixed upstream in 7.3.5 and thus included in the
7.3.6-1 upload to unstable, but it was not closed with the upload.

Regards,
Salvatore



Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Fri, 31 May 2019 20:15:21 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Fri, 31 May 2019 20:15:22 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:17:12 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.