Debian Bug report logs -
#928421
php7.3: CVE-2019-11036
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian PHP Maintainers <team+pkg-php@tracker.debian.org>
:
Bug#928421
; Package src:php7.3
.
(Sat, 04 May 2019 08:48:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian PHP Maintainers <team+pkg-php@tracker.debian.org>
.
(Sat, 04 May 2019 08:48:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: php7.3
Version: 7.3.4-2
Severity: important
Tags: security upstream
Forwarded: https://bugs.php.net/bug.php?id=77950
Hi,
The following vulnerability was published for php7.3.
CVE-2019-11036[0]:
| When processing certain files, PHP EXIF extension in versions 7.1.x
| below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused
| to read past allocated buffer in exif_process_IFD_TAG function. This
| may lead to information disclosure or crash.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-11036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036
[1] https://bugs.php.net/bug.php?id=77950
Regards,
Salvatore
Added tag(s) fixed-upstream.
Request was from debian-bts-link@lists.debian.org
to control@bugs.debian.org
.
(Thu, 09 May 2019 19:30:03 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian PHP Maintainers <team+pkg-php@tracker.debian.org>
:
Bug#928421
; Package src:php7.3
.
(Fri, 31 May 2019 20:15:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Debian PHP Maintainers <team+pkg-php@tracker.debian.org>
.
(Fri, 31 May 2019 20:15:03 GMT) (full text, mbox, link).
Message #12 received at 928421@bugs.debian.org (full text, mbox, reply):
Source: php7.3
Source-Version: 7.3.6-1
On Sat, May 04, 2019 at 10:46:24AM +0200, Salvatore Bonaccorso wrote:
> Source: php7.3
> Version: 7.3.4-2
> Severity: important
> Tags: security upstream
> Forwarded: https://bugs.php.net/bug.php?id=77950
>
> Hi,
>
> The following vulnerability was published for php7.3.
>
> CVE-2019-11036[0]:
> | When processing certain files, PHP EXIF extension in versions 7.1.x
> | below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused
> | to read past allocated buffer in exif_process_IFD_TAG function. This
> | may lead to information disclosure or crash.
This issue was fixed upstream in 7.3.5 and thus included in the
7.3.6-1 upload to unstable, but it was not closed with the upload.
Regards,
Salvatore
Reply sent
to Salvatore Bonaccorso <carnil@debian.org>
:
You have taken responsibility.
(Fri, 31 May 2019 20:15:21 GMT) (full text, mbox, link).
Notification sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Bug acknowledged by developer.
(Fri, 31 May 2019 20:15:22 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 15:17:12 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.