Bug 24176 - php: new version 7.2.14 fixes some bugs
Summary: php: new version 7.2.14 fixes some bugs
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Backports (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard: MGA6-64-OK
Keywords: validated_backport
Depends on: 24165
Blocks:
  Show dependency treegraph
 
Reported: 2019-01-13 20:43 CET by Marc Krämer
Modified: 2019-05-23 12:31 CEST (History)
5 users (show)

See Also:
Source RPM: php-7.2.13-2.mga6.src.rpm
CVE:
Status comment:


Attachments

Description Marc Krämer 2019-01-13 20:43:23 CET
+++ This bug was initially created as a clone of Bug #24165 +++

a new update is released, which fixes many buffer overflow issues in gd, mbstring, phar and xmlrpc
Comment 1 Marc Krämer 2019-01-13 20:46:57 CET
Updated php packages fix security vulnerabilities:

Several buffer overflows in the components GD, MBString, Phar and XMLRPC were discovered and fixed.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10166
https://bugs.php.net/bug.php?id=77269
https://bugs.php.net/bug.php?id=77270
https://bugs.php.net/bug.php?id=77370
https://bugs.php.net/bug.php?id=77371
https://bugs.php.net/bug.php?id=77381
https://bugs.php.net/bug.php?id=77382
https://bugs.php.net/bug.php?id=77385
https://bugs.php.net/bug.php?id=77394
https://bugs.php.net/bug.php?id=77418
https://bugs.php.net/bug.php?id=77247
https://bugs.php.net/bug.php?id=77242
https://bugs.php.net/bug.php?id=77380
========================

Updated packages in core/backports_testing:
========================
php-ini-7.2.14-1.mga6
apache-mod_php-7.2.14-1.mga6
php-cli-7.2.14-1.mga6
php-cgi-7.2.14-1.mga6
libphp_common7-7.2.14-1.mga6
php-devel-7.2.14-1.mga6
php-openssl-7.2.14-1.mga6
php-zlib-7.2.14-1.mga6
php-doc-7.2.14-1.mga6
php-bcmath-7.2.14-1.mga6
php-bz2-7.2.14-1.mga6
php-calendar-7.2.14-1.mga6
php-ctype-7.2.14-1.mga6
php-curl-7.2.14-1.mga6
php-dba-7.2.14-1.mga6
php-dom-7.2.14-1.mga6
php-enchant-7.2.14-1.mga6
php-exif-7.2.14-1.mga6
php-fileinfo-7.2.14-1.mga6
php-filter-7.2.14-1.mga6
php-ftp-7.2.14-1.mga6
php-gd-7.2.14-1.mga6
php-gettext-7.2.14-1.mga6
php-gmp-7.2.14-1.mga6
php-hash-7.2.14-1.mga6
php-iconv-7.2.14-1.mga6
php-imap-7.2.14-1.mga6
php-interbase-7.2.14-1.mga6
php-intl-7.2.14-1.mga6
php-json-7.2.14-1.mga6
php-ldap-7.2.14-1.mga6
php-mbstring-7.2.14-1.mga6
php-mysqli-7.2.14-1.mga6
php-mysqlnd-7.2.14-1.mga6
php-odbc-7.2.14-1.mga6
php-opcache-7.2.14-1.mga6
php-pcntl-7.2.14-1.mga6
php-pdo-7.2.14-1.mga6
php-pdo_dblib-7.2.14-1.mga6
php-pdo_firebird-7.2.14-1.mga6
php-pdo_mysql-7.2.14-1.mga6
php-pdo_odbc-7.2.14-1.mga6
php-pdo_pgsql-7.2.14-1.mga6
php-pdo_sqlite-7.2.14-1.mga6
php-pgsql-7.2.14-1.mga6
php-phar-7.2.14-1.mga6
php-posix-7.2.14-1.mga6
php-readline-7.2.14-1.mga6
php-recode-7.2.14-1.mga6
php-session-7.2.14-1.mga6
php-shmop-7.2.14-1.mga6
php-snmp-7.2.14-1.mga6
php-soap-7.2.14-1.mga6
php-sockets-7.2.14-1.mga6
php-sqlite3-7.2.14-1.mga6
php-sysvmsg-7.2.14-1.mga6
php-sysvsem-7.2.14-1.mga6
php-sysvshm-7.2.14-1.mga6
php-tidy-7.2.14-1.mga6
php-tokenizer-7.2.14-1.mga6
php-xml-7.2.14-1.mga6
php-xmlreader-7.2.14-1.mga6
php-xmlrpc-7.2.14-1.mga6
php-xmlwriter-7.2.14-1.mga6
php-xsl-7.2.14-1.mga6
php-wddx-7.2.14-1.mga6
php-zip-7.2.14-1.mga6
php-fpm-7.2.14-1.mga6
phpdbg-7.2.14-1.mga6
php-debuginfo-7.2.14-1.mga6


Source RPMs: 
php-7.2.14-1.mga6.src.rpm

Assignee: bugsquad => qa-bugs
Component: RPM Packages => Backports
Source RPM: php-5.6.39-1.mga6.src.rpm => php-7.2.13-2.mga6.src.rpm

Comment 2 PC LX 2019-01-13 23:11:18 CET
Installed and tested without issues.

Tested with various large (e.g. wordpress, drupal, roundcubemail) and small scripts, using HTTP(S) and CLI. Also tested the various PoC.

System: Mageia 6, x86_64, Intel CPU.

Details of system and tests are here:
https://bugs.mageia.org/show_bug.cgi?id=24165#c10
Comment 3 Len Lawrence 2019-01-14 00:28:12 CET
Mageia 6, x86_64

Tested PoCs before and after updates.  Details on https://bugs.mageia.org/show_bug.cgi?id=24165 comments 3 to 9.  There is still some doubt over one failed PoC test, failed in the sense of showing no change before and after updates.
Comment 4 Marc Krämer 2019-01-14 10:03:47 CET
strange: when I run the test with php-phar-7.2.13-2.mga6, I get:

$ USE_ZEND_ALLOC=0 php -r "var_dump(new Phar(file_get_contents('poc.phar'),0,'test.phar'));"
PHP Fatal error:  Uncaught UnexpectedValueException: Cannot create a phar archive from a URL like "
Comment 5 Marc Krämer 2019-01-14 10:05:44 CET
with php-phar-7.2.14-1 I get the same result. But this looks good, no?
Comment 6 PC LX 2019-01-14 11:01:15 CET
(In reply to Marc Krämer from comment #4)
> strange: when I run the test with php-phar-7.2.13-2.mga6, I get:
> 
> $ USE_ZEND_ALLOC=0 php -r "var_dump(new
> Phar(file_get_contents('poc.phar'),0,'test.phar'));"
> PHP Fatal error:  Uncaught UnexpectedValueException: Cannot create a phar
> archive from a URL like "

To test this PoC, PHP needs to be built with AddressSanitizer enabled and that is probably not the case for this build.
https://en.wikipedia.org/wiki/AddressSanitizer
Comment 7 Len Lawrence 2019-01-15 00:18:04 CET
@Marc.  Yes it is probably OK.  PC LX points out that the asan framework is used upstream, as it often is for POC tests involving memory leaks, buffer overflows and the like.  If there is a difference in the  results for our builds that could be interpreted as good, epecially if say a crash is avoided in the after test, or if they are the same and the diagnostics seem to show that errors are being handled properly that is also good.  For testers it is not really a precise science.  My doubt, expressed in comment 3, was because the error did not look as if it had been caught, but if it worked for you...
Comment 8 Marc Krämer 2019-01-15 00:27:49 CET
ok, thanks for the tests! So I hope we can move on :)
Comment 9 Len Lawrence 2019-01-15 00:46:03 CET
Of course, 64-bit OK coming up.

Whiteboard: (none) => MGA6-64-OK

Comment 10 Lewis Smith 2019-01-15 22:10:38 CET
Two (!) 64-bit tests = validation.
I am uneasy about these backports which incorporate security & bug fixes not (I think) having advisories. We must clarify that. Maybe they are optional.

Keywords: (none) => validated_backport
CC: (none) => lewyssmith

Comment 11 Marc Krämer 2019-01-15 22:17:47 CET
@Lewis: sorry I did not get your point. What do you think is still needed to be clarified - or done before?

Do you think an advisory for a backported package should be published? If so, I think you're right. I think backports should have an advisory, if we push an security update.
Comment 12 Thomas Backlund 2019-01-15 22:50:38 CET
Packages moved.

Resolution: (none) => FIXED
CC: (none) => tmb
Status: NEW => RESOLVED

Comment 13 Lewis Smith 2019-01-16 18:50:40 CET
(In reply to Marc Krämer from comment #11)
> @Lewis: sorry I did not get your point. What do you think is still needed to
> be clarified - or done before?
We need to clarify whether Backports require advisories, or not; or whether they *can* have one even if not strictly required. My understanding is that they do not have advisories; but I think they should. There has to be a reason for a backport; why not tell the users? I have omitted, for validated backports, a few that looked rather important.

> Do you think an advisory for a backported package should be published? If
> so, I think you're right. I think backports should have an advisory, if we
> push an security update.
Or bugfixes. We both agree, but this is just a matter of our opinion. Seeing that tmb has added himself to this bug, he will doubtless advise us!
Comment 14 Thomas Backlund 2019-05-23 12:31:56 CEST
(In reply to Lewis Smith from comment #13)

> Or bugfixes. We both agree, but this is just a matter of our opinion. Seeing
> that tmb has added himself to this bug, he will doubtless advise us!

Late to the party... it was/is planned to have advisories for backports, but since no-one have had time to extend mga-advisories to handle backports, currently we just move the packages...

Note You need to log in before you can comment on or make changes to this bug.