Bug 1473822 (CVE-2017-7890)
Summary: | CVE-2017-7890 php: Buffer over-read from unitialized data in gdImageCreateFromGifCtx function | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abhgupta, fedora, hhorak, jorton, leonfauster, ravpatil, rcollet, sardella, tiwillia, webstack-team |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | php 5.6.31, php 7.0.21, php 7.1.7 | Doc Type: | If docs needed, set a value |
Doc Text: |
A data leak was found in gdImageCreateFromGifCtx() in GD Graphics Library used in PHP before 5.6.31 and 7.1.7. An attacker could craft a malicious GIF image and read up to 762 bytes from stack.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 03:17:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1473823, 1536012, 1537128, 1554537 | ||
Bug Blocks: | 1491035, 1493963 |
Description
Pedro Sampaio
2017-07-21 19:15:32 UTC
Created php tracking bugs for this issue: Affects: fedora-all [bug 1473823] Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. We recommend avoiding usage of the functions gdImageCreateFromGifCtx() and imagecreatefromstring() as they can lead to stack data leak. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Is it possible to get more details on why this issue would not be fixed ? This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0406 https://access.redhat.com/errata/RHSA-2018:0406 *** Bug 1562758 has been marked as a duplicate of this bug. *** This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Via RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2018:1296 |