Multiple heap-based buffer overflow caused by integer overflows were found in xml_utf8_encode, zend_string_alloc and php_addcslashes functions. Upstream bug: https://bugs.php.net/bug.php?id=71637 Upstream patch: http://git.php.net/?p=php-src.git;a=commit;h=57b997ebf99e0eb9a073e0dafd2ab100bd4a112d
Created php tracking bugs for this issue: Affects: fedora-all [bug 1315340]
CVE assignments via: http://seclists.org/oss-sec/2016/q2/163 CVE-2016-4344 is for the issue in: ext/xml/xml.c CVE-2016-4345 is for the issue in: ext/filter/sanitizing_filters.c CVE-2016-4346 is for the issue in: ext/standard/string.c
PHP 7 only. Additionally, these issue could only be triggered when PHP is configured to execute scripts with no or very high memory_limit. That is not a typical configured, the default in PHP packages in Red Hat products is 128M.