-
-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PHP 7.0.30 and 7.2.5 released #858
Comments
Also 7.1.17 |
This is in fact a critical security update to 7.x versions and 5.6x. I suggest editing the subject line to include that fact, and also to include that the 5.6 branch is also vulnerable. OVERVIEW: Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code. PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications. Successfully exploiting the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected application. Depending on the privileges associated with the application, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights. Failed exploitation could result in a denial-of-service condition. There are currently no reports of these vulnerabilities being exploited in the wild. SYSTEMS AFFECTED:
... RECOMENDATIONS: We recommend the following actions be taken:
|
The only issue that can be remotely triggered is the th exif bug in crafted JPGs. And you would need to run a site that process user uploaded JPGs. The impact seems to be limited to me. Nothing else is even remotely close to critical. |
Thank you for the clarification @oerdnj . I trust your analysis on this, and am not sure why the cisecurity.org alert would label these as critical releases. By going through the changeset, I did seem to feel that most of the other issues (some memory issues and buffer overflow type things) seemed less problematic than labelled. I appreciate you responding and I will assume the priority on updating the packages will not be high. Thanks again. |
This is critical. Many forums and gallery scripts are actually using exif_read_data() to get additional data from user uploaded images. |
I am quite sure it’s not: https://nvd.nist.gov/vuln-metrics/cvss I’ll update the packages when I have the time. |
Also this is not a stack-smashing, just OOB read, so definitely not critical. |
All PHP packages should be updated now. Sorry for the unusual delay, but it's too beautiful outside to be sitting at the computer :) |
Thank you @oerdnj . I appreciate your efforts so much. 💯 |
7.0.30 and 7.2.5
Thanks!
The text was updated successfully, but these errors were encountered: