php7.0: CVE-2017-8923: Overflowing the length of string causes crash

Related Vulnerabilities: CVE-2017-8923  

Debian Bug report logs - #881538
php7.0: CVE-2017-8923: Overflowing the length of string causes crash

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 12 Nov 2017 21:36:01 UTC

Severity: important

Tags: security, upstream

Found in version php7.0/7.0.19-1

Fixed in version 7.0.32-1+rm

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://bugs.php.net/bug.php?id=74577

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>:
Bug#881538; Package src:php7.0. (Sun, 12 Nov 2017 21:36:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>. (Sun, 12 Nov 2017 21:36:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: php7.0: CVE-2017-8923: Overflowing the length of string causes crash
Date: Sun, 12 Nov 2017 22:33:46 +0100
Source: php7.0
Version: 7.0.19-1
Severity: important
Tags: security upstream
Forwarded: https://bugs.php.net/bug.php?id=74577
Control: clone -1 -2
Control: reassign -2 src:php7.1 7.1.8-1
Control: retitle -2 php7.1: CVE-2017-8923: Overflowing the length of string causes crash

Hi,

the following vulnerability was published for php7.0 and php7.1.

CVE-2017-8923[0]:
| The zend_string_extend function in Zend/zend_string.h in PHP through
| 7.1.5 does not prevent changes to string objects that result in a
| negative length, which allows remote attackers to cause a denial of
| service (application crash) or possibly have unspecified other impact
| by leveraging a script's use of .= with a long string.

Attached to [1] and [2] are POCs to demostrate the issue (verified on
i386 sid).

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-8923
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8923
[1] https://bugs.php.net/bug.php?id=74577
[2] https://bugs.php.net/bug.php?id=73122

Regards,
Salvatore



Bug 881538 cloned as bug 881539 Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Sun, 12 Nov 2017 21:36:04 GMT) (full text, mbox, link).


Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Mon, 08 Oct 2018 19:01:01 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Mon, 08 Oct 2018 19:01:01 GMT) (full text, mbox, link).


Message #12 received at 881538-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 440775-done@bugs.debian.org,823973-done@bugs.debian.org,830943-done@bugs.debian.org,831752-done@bugs.debian.org,835173-done@bugs.debian.org,842427-done@bugs.debian.org,854140-done@bugs.debian.org,854385-done@bugs.debian.org,855393-done@bugs.debian.org,858825-done@bugs.debian.org,860337-done@bugs.debian.org,868880-done@bugs.debian.org,869431-done@bugs.debian.org,871658-done@bugs.debian.org,871825-done@bugs.debian.org,879978-done@bugs.debian.org,881270-done@bugs.debian.org,881538-done@bugs.debian.org,883209-done@bugs.debian.org,883404-done@bugs.debian.org,888617-done@bugs.debian.org,892452-done@bugs.debian.org,895423-done@bugs.debian.org,898193-done@bugs.debian.org,898895-done@bugs.debian.org,899217-done@bugs.debian.org,901710-done@bugs.debian.org,902353-done@bugs.debian.org,910066-done@bugs.debian.org,
Cc: php7.0@packages.debian.org
Subject: Bug#910071: Removed package(s) from unstable
Date: Mon, 08 Oct 2018 18:56:55 +0000
Version: 7.0.32-1+rm

Dear submitter,

as the package php7.0 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/910071

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Ansgar Burchardt (the ftpmaster behind the curtain)



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 06 Nov 2018 07:32:39 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:12:40 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.