Bug 931418 (CVE-2015-3307) - VUL-1: CVE-2015-3307: php5, php53: Heap metadata corruption when parsing tar file in phar_tar_process_metadata()
Summary: VUL-1: CVE-2015-3307: php5, php53: Heap metadata corruption when parsing tar ...
Status: RESOLVED FIXED
Alias: CVE-2015-3307
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Petr Gajdos
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/116899/
Whiteboard: CVSSv2:RedHat:CVE-2015-3307:5.1:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-05-19 08:23 UTC by Alexander Bergmann
Modified: 2016-08-09 08:22 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2015-05-19 08:23:21 UTC
CVE-2015-3307

Priority: Low

Description: 
[Heap metadata corruption when parsing tar file in
phar_tar_process_metadata()]

Notes:
sbeattie> fixed in 5.4.40, 5.5.24, 5.6.8

Upstream fix:
http://git.php.net/?p=php-src.git;a=commit;h=17cbd0b5b78a7500f185b3781a2149881bfff8ae

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3307
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3307.html
Comment 1 Alexander Bergmann 2015-05-19 08:37:18 UTC
Petr, please check if this is the same as or related to CVE-2015-2783/bnc#928511.
Comment 2 Swamp Workflow Management 2015-05-19 22:00:36 UTC
bugbot adjusting priority
Comment 3 Petr Gajdos 2015-05-20 11:29:34 UTC
The correct php bug seems to be #69443.
Comment 5 Petr Gajdos 2015-05-20 11:42:58 UTC
Upstream and reporter of the php bug #69443 confirms that it was fixed in commit for CVE-2015-2783 (bnc#928511).

---------------------------------
Yes, it was inadvertently resolved in 5.6.8 when fixing #69324

This is the commit that fixes it:
http://git.php.net/?p=php-src.git;a=commit;h=17cbd0b5b78a7500f185b3781a2149881bfff8ae

The vulnerable line that was removed was on phar.c:611
PHAR_GET_32(*buffer, buf_len);
----------------------------------