Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 230575 - dev-lang/php <5.2.6-r2: safe_mode bypass, code execution, DoS (CVE-2008-2829)
Summary: dev-lang/php <5.2.6-r2: safe_mode bypass, code execution, DoS (CVE-2008-2829)
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
Whiteboard: B2 [glsa]
Depends on:
Reported: 2008-07-02 21:52 UTC by Christian Hoffmann (RETIRED)
Modified: 2008-11-16 16:15 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Christian Hoffmann (RETIRED) gentoo-dev 2008-07-02 21:52:10 UTC
php-5.2.6-r2 in the tree, I have yet to test whether the fix for the imap issue works properly, so if it is ok for you, I'd want to wait with stabilization until tomorrow evening.
Personally I've tested phpMyAdmin (lighty+fastcgi, apache/mod_php) under high load, WBB3 (lighty+fastcgi) and roundcube (lighty+fastcgi). Everything works as expected, no regressions so far.

List of issues fixed:

 * Insecure c-client api calls allow for buffer overflows
   This IMO allows for local code execution (as such bypassing safe_mode etc.)
   and maybe eben remote code execution when processing specially-crafted

 * Crash in stream_context_set_params()

 * Crash in class PDORow
   Commit msg: "Add check for avoid segfault when trying instantiate
                PDORow manually"

 * Crash (double free) in Dom->setAttributeNode
   Commit msg: "fixed bug #45251 (double free or corruption with

 * Crash in array functions under certain circumstances
   Commit msg: "Fixed bug #45312 (Segmentation fault on second request for
                array functions)"

 * Crash related to tick functions
   Commit msg: "Fixed bug #45352 (Segmentation fault because of tick function
                on second request)"

 * Possible overflow+crash when dealing with certain math operations
   Commit msg: "Fixed overflow crash (at least on Windows) in div_function
                with LONG_MIN / -1"
   No idea in what exact circumstances this happens, whether it might allow
   for code execution or whether it is reproducable on Linux at all.

 * ext/pcre: Heap-based buffer overflow (CVE-2008-2371) in bundled libpcre
   see Gentoo bug 228091
Comment 1 Christian Hoffmann (RETIRED) gentoo-dev 2008-07-03 21:04:12 UTC
Security, feel free to do your thing and call for stabilization.

I've not been able to create a test case for the c-client issue, and I just discovered there are at least two other places where similar overflows can occur (which are not addressed by the patch). So I'd suggest to use this as an intermediate solution, we're waiting on another fix anyway, so -r3 is going to happen in any case.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2008-07-06 22:26:54 UTC
Arches, please test and mark stable:
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
Comment 3 Brent Baude (RETIRED) gentoo-dev 2008-07-07 03:00:20 UTC
ppc and ppc64 done
Comment 4 Thomas Anderson (tanderson) (RETIRED) gentoo-dev 2008-07-07 11:35:53 UTC
amd64 stable, tested with mythweb, phpmyadmin, phpsysinfo, ampache...
Comment 5 Michał Lipski 2008-07-07 12:37:25 UTC

what about this:
Comment 6 Christian Hoffmann (RETIRED) gentoo-dev 2008-07-07 15:15:05 UTC
(In reply to comment #5)
> what about this:
It's not a regression (I just verified) and as such, it should not prevent a new version going stable for security reasons.
BTW, I'm also assuming that it is related to libtool-2.2* and as such doesn't affect stable anyway.
Use FEATURES=-stricter as a workaround. And let's keep the rest of this discussion in the relevant bug. :)
Comment 7 Markus Meier gentoo-dev 2008-07-07 21:46:44 UTC
x86 stable
Comment 8 Raúl Porcel (RETIRED) gentoo-dev 2008-07-08 11:16:04 UTC
alpha/ia64/sparc stable
Comment 9 Christian Hoffmann (RETIRED) gentoo-dev 2008-07-10 19:01:34 UTC
I forgot to bump the dependency on c-client to 2006k in php-5.2.6-r2, I just committed the fixed *DEPEND. Keyword-wise this is no problem as all arches, which have -r2 stable also have the required c-client version stable.

sh/arm/s390: You need to stabilize >=net-libs/c-client-2006k before stabling this version of php (or any later).

hppa is fine, as far as I can see.
Comment 10 Jeroen Roovers (RETIRED) gentoo-dev 2008-07-11 01:39:29 UTC
Stable for HPPA. Removing the blocking bug as it is easily worked around by not setting FFLAGS.
Comment 11 Tobias Heinlein (RETIRED) gentoo-dev 2008-11-16 16:15:02 UTC
GLSA 200811-05, thanks everyone, especially hoffie.