Hide Forgot
An out-of-bounds read in php_url_parse_ex() was found that allows to cause DoS by triggering segmentation fault. Upstream bug: https://bugs.php.net/bug.php?id=70480 Upstream patch: https://git.php.net/?p=php-src.git;a=commit;h=e1ba58f068f4bfc8ced75bb017cd31d8beddf3c2
Fedora 24, package php, is not vulnerable because it currently has php-5.6.22-1.fc24 in stable
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Via RHSA-2016:2750 https://rhn.redhat.com/errata/RHSA-2016-2750.html
Notice that the fix for this issue introduce a behavior change in parse_url function which may break some code or extension (ex pecl/ssh2) relying on some characters to be allowed in host part (e.g. spaces)