Hide Forgot
An integer overflow in php_filter_full_special_chars was found, similar to CVE-2016-5094. Reported in comment for the bug: https://bugs.php.net/bug.php?id=72135 CVE assignment: http://seclists.org/oss-sec/2016/q2/412
Created php tracking bugs for this issue: Affects: fedora-all [bug 1340745]
php-5.6.22-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
While the affected code was added in PHP 5.3.3: https://github.com/php/php-src/commit/a5b5743d71fbd5ae944469a1ca443a1cdb30663a it wasn't actually used because of the incorrect FILTER_SANITIZE_FULL_SPECIAL_CHARS constant definition, which was only corrected in PHP 5.4.18 and 5.5.2: https://github.com/php/php-src/commit/da3886de6dc8edab3da14331227816d6ca8e9b96 This issue is similar to CVE-2016-5094, so the impact and mitigation notes in bug 1340738 comment 3 are applicable here. This could only affect PHP installations where no or very high memory_limit is set. The default limit in Red Hat PHP packages in 128M, and hence the default configuration is not affected. This issue has not been addressed upstream to date.