Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1340742 - (CVE-2016-5095) CVE-2016-5095 php: Integer overflow in php_filter_full_special_chars
CVE-2016-5095 php: Integer overflow in php_filter_full_special_chars
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20160517,reported=2...
: Security
Depends On: 1340745
Blocks: 1339953
  Show dependency treegraph
 
Reported: 2016-05-30 04:41 EDT by Adam Mariš
Modified: 2016-07-11 09:16 EDT (History)
14 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-06-09 04:57:43 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-05-30 04:41:30 EDT
An integer overflow in php_filter_full_special_chars was found, similar to CVE-2016-5094.

Reported in comment for the bug:

https://bugs.php.net/bug.php?id=72135

CVE assignment:

http://seclists.org/oss-sec/2016/q2/412
Comment 1 Adam Mariš 2016-05-30 04:47:08 EDT
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1340745]
Comment 2 Fedora Update System 2016-06-03 11:22:02 EDT
php-5.6.22-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
Comment 3 Tomas Hoger 2016-06-09 04:57:43 EDT
While the affected code was added in PHP 5.3.3:

https://github.com/php/php-src/commit/a5b5743d71fbd5ae944469a1ca443a1cdb30663a

it wasn't actually used because of the incorrect FILTER_SANITIZE_FULL_SPECIAL_CHARS constant definition, which was only corrected in PHP 5.4.18 and 5.5.2:

https://github.com/php/php-src/commit/da3886de6dc8edab3da14331227816d6ca8e9b96

This issue is similar to CVE-2016-5094, so the impact and mitigation notes in bug 1340738 comment 3 are applicable here.  This could only affect PHP installations where no or very high memory_limit is set.  The default limit in Red Hat PHP packages in 128M, and hence the default configuration is not affected.

This issue has not been addressed upstream to date.

Note You need to log in before you can comment on or make changes to this bug.