Bugzilla – Bug 1214103
VUL-0: CVE-2023-3824: php7,php74,php72,php53,php8,php5: buffer overflows in phar_dir_read()
Last modified: 2024-02-22 14:30:04 UTC
CVE-2023-3824 https://www.php.net/ChangeLog-8.php#8.0.30 Phar: Fixed bug GHSA-jqcx-ccgc-xwhv (Buffer mismanagement in phar_dir_read()). (CVE-2023-3824) References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3824 https://bugzilla.redhat.com/show_bug.cgi?id=2230101 https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv
Fix: https://github.com/php/php-src/commit/80316123f3e9dcce8ac419bd9dd43546e2ccb5ef
This is an autogenerated message for OBS integration: This bug (1214103) was mentioned in https://build.opensuse.org/request/show/1105258 Factory / php8
/214103 # grep '^phar.readonly' /etc/php8/cli/php.ini phar.readonly = Off /214103 # /214103 # php create-phar.php /214103 # ls myarchive.phar myarchive.phar /214103 # BEFORE /214103 # php read-phar.php string(4097) "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB" /214103 # AFTER /214103 # php read-phar.php bool(false) /214103 # Tried with php 8.0 and php 7.4.
Submitted for 15sp4/php8, 15sp4/php7, 15sp2/php7 and 12/php74. I believe all fixed.
SUSE-SU-2023:3445-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1214103, 1214106 CVE References: CVE-2023-3823, CVE-2023-3824 Sources used: Web and Scripting Module 12 (src): php74-7.4.33-1.62.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): php74-7.4.33-1.62.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3498-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1214103, 1214106 CVE References: CVE-2023-3823, CVE-2023-3824 Sources used: SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): php7-7.4.33-150200.3.60.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): php7-7.4.33-150200.3.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): php7-7.4.33-150200.3.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): php7-7.4.33-150200.3.60.1 SUSE Manager Server 4.2 (src): php7-7.4.33-150200.3.60.1 SUSE Enterprise Storage 7.1 (src): php7-7.4.33-150200.3.60.1 SUSE Enterprise Storage 7 (src): php7-7.4.33-150200.3.60.1 openSUSE Leap 15.4 (src): php7-7.4.33-150200.3.60.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): php7-7.4.33-150200.3.60.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): php7-7.4.33-150200.3.60.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): php7-7.4.33-150200.3.60.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3528-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1214103, 1214106 CVE References: CVE-2023-3823, CVE-2023-3824 Sources used: openSUSE Leap 15.4 (src): php8-fastcgi-8.0.30-150400.4.37.1, php8-8.0.30-150400.4.37.1, php8-embed-8.0.30-150400.4.37.1, php8-fpm-8.0.30-150400.4.37.1, apache2-mod_php8-8.0.30-150400.4.37.1, php8-test-8.0.30-150400.4.37.1 openSUSE Leap 15.5 (src): php8-fastcgi-8.0.30-150400.4.37.1, php8-8.0.30-150400.4.37.1, php8-embed-8.0.30-150400.4.37.1, php8-fpm-8.0.30-150400.4.37.1, apache2-mod_php8-8.0.30-150400.4.37.1, php8-test-8.0.30-150400.4.37.1 Web and Scripting Module 15-SP4 (src): php8-fastcgi-8.0.30-150400.4.37.1, php8-8.0.30-150400.4.37.1, php8-embed-8.0.30-150400.4.37.1, php8-fpm-8.0.30-150400.4.37.1, apache2-mod_php8-8.0.30-150400.4.37.1, php8-test-8.0.30-150400.4.37.1 Web and Scripting Module 15-SP5 (src): php8-fastcgi-8.0.30-150400.4.37.1, php8-8.0.30-150400.4.37.1, php8-embed-8.0.30-150400.4.37.1, php8-fpm-8.0.30-150400.4.37.1, apache2-mod_php8-8.0.30-150400.4.37.1, php8-test-8.0.30-150400.4.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3541-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1214103, 1214106 CVE References: CVE-2023-3823, CVE-2023-3824 Sources used: openSUSE Leap 15.4 (src): php7-test-7.4.33-150400.4.28.1, php7-fpm-7.4.33-150400.4.28.1, apache2-mod_php7-7.4.33-150400.4.28.1, php7-fastcgi-7.4.33-150400.4.28.1, php7-embed-7.4.33-150400.4.28.1, php7-7.4.33-150400.4.28.1 openSUSE Leap 15.5 (src): php7-test-7.4.33-150400.4.28.1, php7-fpm-7.4.33-150400.4.28.1, apache2-mod_php7-7.4.33-150400.4.28.1, php7-fastcgi-7.4.33-150400.4.28.1, php7-embed-7.4.33-150400.4.28.1, php7-7.4.33-150400.4.28.1 Legacy Module 15-SP4 (src): php7-7.4.33-150400.4.28.1, php7-fastcgi-7.4.33-150400.4.28.1, php7-fpm-7.4.33-150400.4.28.1, apache2-mod_php7-7.4.33-150400.4.28.1 Legacy Module 15-SP5 (src): php7-7.4.33-150400.4.28.1, php7-fastcgi-7.4.33-150400.4.28.1, php7-fpm-7.4.33-150400.4.28.1, apache2-mod_php7-7.4.33-150400.4.28.1 SUSE Package Hub 15 15-SP4 (src): php7-embed-7.4.33-150400.4.28.1 SUSE Package Hub 15 15-SP5 (src): php7-embed-7.4.33-150400.4.28.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.