Please backport the upstream patch to prevent attacks based on hash collisions
Bug #910296 reported by
Qishuai Liu
This bug affects 9 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
php5 (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Hardy |
Fix Released
|
Medium
|
Steve Beattie | ||
Lucid |
Fix Released
|
Medium
|
Steve Beattie | ||
Maverick |
Fix Released
|
Medium
|
Steve Beattie | ||
Natty |
Fix Released
|
Medium
|
Steve Beattie | ||
Oneiric |
Fix Released
|
Medium
|
Steve Beattie | ||
Precise |
Fix Released
|
Medium
|
Unassigned |
Bug Description
According to CVE-2011-4885: PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
CVE link: http://
upstream php changes: http://
visibility: | private → public |
visibility: | private → public |
Changed in php5 (Ubuntu Hardy): | |
status: | New → Confirmed |
Changed in php5 (Ubuntu Lucid): | |
status: | New → Confirmed |
Changed in php5 (Ubuntu Maverick): | |
status: | New → Confirmed |
Changed in php5 (Ubuntu Natty): | |
status: | New → Confirmed |
Changed in php5 (Ubuntu Oneiric): | |
status: | New → Confirmed |
Changed in php5 (Ubuntu Precise): | |
status: | New → Confirmed |
Changed in php5 (Ubuntu Hardy): | |
importance: | Undecided → Medium |
Changed in php5 (Ubuntu Lucid): | |
importance: | Undecided → Medium |
Changed in php5 (Ubuntu Maverick): | |
importance: | Undecided → Medium |
Changed in php5 (Ubuntu Natty): | |
importance: | Undecided → Medium |
Changed in php5 (Ubuntu Oneiric): | |
importance: | Undecided → Medium |
Changed in php5 (Ubuntu Precise): | |
importance: | Undecided → Medium |
To post a comment you must log in.
You actually need two commits for this fix.
This one is the 5.3 branch commit for the first commit:
http:// svn.php. net/viewvc? view=revision& revision= 321038
There was a fix to that commit later:
http:// svn.php. net/viewvc? view=revision& revision= 321335
I've combined both of these patches into one patch that can be applied to 5.3.2-1ubuntu4.11:
https:/ /gist.github. com/1610477
Should just be able to drop it into debian/patches and add it to the end of debian/ patches/ series.
I'm still confirming if that patch fixes the DoS.