An integer underflow resulting into arbitrary null character write in fread/gzread function was found. Upstream bug: https://bugs.php.net/bug.php?id=72114 Upstream patch: https://git.php.net/?p=php-src.git;a=commit;h=abd159cce48f3e34f08e4751c568e09677d5ec9c CVE request: http://seclists.org/oss-sec/2016/q2/404
Created php tracking bugs for this issue: Affects: fedora-all [bug 1339950]
php-5.6.22-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
php-5.6.22-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
php-5.6.22-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
This problem occurs when fread or gzread are called with excessively large $length argument value (above 2GB / 2^31). Additionally, this flaw can only be triggered when PHP is running with no memory limit, or its memory limit exceeds 2GB. The default configuration of PHP packages in Red Hat products sets memory_limit to 128M, completely blocking this issue. This issue can be mitigated by ensuring memory_limit is set and its value does not exceed 2GB.
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Via RHSA-2016:2750 https://rhn.redhat.com/errata/RHSA-2016-2750.html