Bug 1340742 (CVE-2016-5095) - CVE-2016-5095 php: Integer overflow in php_filter_full_special_chars
Summary: CVE-2016-5095 php: Integer overflow in php_filter_full_special_chars
Alias: CVE-2016-5095
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1340745
Blocks: 1339953
TreeView+ depends on / blocked
Reported: 2016-05-30 08:41 UTC by Adam Mariš
Modified: 2019-09-29 13:50 UTC (History)
14 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2016-06-09 08:57:43 UTC

Attachments (Terms of Use)

Description Adam Mariš 2016-05-30 08:41:30 UTC
An integer overflow in php_filter_full_special_chars was found, similar to CVE-2016-5094.

Reported in comment for the bug:


CVE assignment:


Comment 1 Adam Mariš 2016-05-30 08:47:08 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1340745]

Comment 2 Fedora Update System 2016-06-03 15:22:02 UTC
php-5.6.22-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 3 Tomas Hoger 2016-06-09 08:57:43 UTC
While the affected code was added in PHP 5.3.3:


it wasn't actually used because of the incorrect FILTER_SANITIZE_FULL_SPECIAL_CHARS constant definition, which was only corrected in PHP 5.4.18 and 5.5.2:


This issue is similar to CVE-2016-5094, so the impact and mitigation notes in bug 1340738 comment 3 are applicable here.  This could only affect PHP installations where no or very high memory_limit is set.  The default limit in Red Hat PHP packages in 128M, and hence the default configuration is not affected.

This issue has not been addressed upstream to date.

Note You need to log in before you can comment on or make changes to this bug.