Bug 1260748 - php: getimagesize() fails for very large WBMP causing an integer overflow
Summary: php: getimagesize() fails for very large WBMP causing an integer overflow
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1260762
Blocks: 1260756
TreeView+ depends on / blocked
 
Reported: 2015-09-07 15:24 UTC by Adam Mariš
Modified: 2019-09-29 13:36 UTC (History)
15 users (show)

Fixed In Version: php 5.6.13
Clone Of:
Environment:
Last Closed: 2015-09-28 12:57:56 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2015-09-07 15:24:22 UTC
An integer overflow occurs when the size of the supplied WBMP is greater than (2^31-1) resulting in invalid WBMPs returning a "valid" response, which circumvents the size limitation. Very small WBMP (less than 12 bytes) cause a read error and are not recognized.

Upstream report:

https://bugs.php.net/bug.php?id=70052

Upstream patch:

http://git.php.net/?p=php-src.git;a=commit;h=87829c09a1d9e39bee994460d7ccf19dd20eda14

Comment 1 Adam Mariš 2015-09-07 16:13:39 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1260762]

Comment 2 Fedora Update System 2015-09-14 22:19:56 UTC
php-5.6.13-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.

Comment 3 Fedora Update System 2015-09-14 23:19:02 UTC
php-5.6.13-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 4 Fedora Update System 2015-09-18 18:43:25 UTC
php-5.6.13-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 5 Tomas Hoger 2015-09-28 12:57:56 UTC
It does not seem any security impact of this bug has been demonstrated.  Not handling as security flaw.


Note You need to log in before you can comment on or make changes to this bug.