An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible.
https://usn.ubuntu.com/3922-3/
https://usn.ubuntu.com/3922-2/
https://bugs.php.net/bug.php?id=77586
http://php.net/ChangeLog-7.php
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html