CVE-2018-14884

NameCVE-2018-14884
DescriptionAn issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php5 (PTS)jessie, jessie (lts)5.6.40+dfsg-0+deb8u21fixed
php7.0 (PTS)stretch (security)7.0.33-0+deb9u12fixed
stretch (lts), stretch7.0.33-0+deb9u19fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php5sourcewheezy(not affected)
php5source(unstable)(not affected)
php7.0source(unstable)7.0.27-1
php7.1source(unstable)7.1.13-1
php7.2source(unstable)7.2.1-1

Notes

- php5 <not-affected> (vulnerable code not present)
Fixed in 7.0.27, 7.1.13, 7.2.1
PHP Bug: https://bugs.php.net/bug.php?id=75535
Fixed by: https://github.com/php/php-src/commit/0e097f2c96ce31b16fa371981045f224e5a37160
Introduced in: https://github.com/php/php-src/commit/5146d9f8ac170d8ba7109370d732d56dc0777578
[wheezy] - php5 <not-affected> (vulnerable code not present)

Search for package or bug name: Reporting problems