|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
Patchesfile-upstream.patch (last revision 2014-07-30 12:00 UTC by [email protected])Pull RequestsHistoryAllCommentsChangesGit/SVN commits
[2014-07-30 12:00 UTC] [email protected]
[2014-07-30 12:01 UTC] [email protected]
-Assigned To:
+Assigned To: remi
[2014-07-30 12:01 UTC] [email protected]
[2014-08-08 06:33 UTC] [email protected]
[2014-08-11 07:31 UTC] [email protected]
-CVE-ID:
+CVE-ID: 2014-3587
[2014-08-11 07:31 UTC] [email protected]
[2014-08-15 00:11 UTC] [email protected]
[2014-08-15 00:45 UTC] [email protected]
-Status: Assigned
+Status: Closed
[2014-08-15 00:45 UTC] [email protected]
[2014-08-15 04:58 UTC] [email protected]
[2014-08-15 04:58 UTC] [email protected]
[2014-08-19 08:34 UTC] [email protected]
[2014-08-19 14:13 UTC] [email protected]
[2014-08-27 03:17 UTC] [email protected]
[2014-10-07 23:13 UTC] [email protected]
[2014-10-07 23:13 UTC] [email protected]
[2014-10-07 23:24 UTC] [email protected]
[2014-10-07 23:24 UTC] [email protected]
|
|||||||||||||||||||||||||||
Copyright © 2001-2026 The PHP GroupAll rights reserved. |
Last updated: Thu Jan 01 08:00:01 2026 UTC |
Description: ------------ During test patch for CVE-2012-1571, we discover another possible segfault in cd.c #0 0x00fcf2cd in cdf_read_property_info (sst=0xbfb7d9b0, h=0xbfb7ddfc, offs=167896768, info=0xbfb7d9f8, count=0xbfb7d9f4, maxcount=0xbfb7d938) at /usr/src/debug/php-5.3.3/ext/fileinfo/libmagic/cdf.c:776 776 inp[i].pi_type = CDF_TOLE4(q[0]); (gdb) p sst->sst_tab $1 = (void *) 0xa01e690 (gdb) p p $2 = (const uint32_t *) 0xa01e6c8 (gdb) p e $3 = (const uint32_t *) 0xa01e970 (gdb) p q $4 = (const uint32_t *) 0x201e6bf We have a 32bits pointer overflow.