| Summary: | libgd new security issue CVE-2015-8874 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | lewyssmith, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/688208/ | ||
| Whiteboard: | has_procedure advisory mga5-64-ok MGA5-32-OK | ||
| Source RPM: | libgd-2.1.1-1.1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-05-20 18:20:25 CEST
Unfortunately this was missed when we updated to PHP 5.6.12. From the upstream PHP bug: https://bugs.php.net/bug.php?id=66387 PoC is: <?php $im = imagecreatetruecolor(20, 20); $c = imagecolorallocate($im, 255, 0, 0); imagefilltoborder($im, 0, -999355, $c, $c); ?> save that as foo.php and run "php foo.php" and you get a segfault. Whiteboard:
(none) =>
has_procedure Mageia 5 i586, after the update, no segfault. Whiteboard:
has_procedure =>
has_procedure MGA5-32-OK Tested mga5 64 Validating Keywords:
(none) =>
validated_update Had just done the x64 test... To confirm Claire's findings. Testing M5 x64 @David: Thanks for the neat test in Comment 1. BEFORE update: lib64gd3-2.1.1-1.1.mga5 gd-utils-2.1.1-1.1.mga5 $ php foo.php Segmentation fault AFTER update: lib64gd3-2.1.1-1.2.mga5 gd-utils-2.1.1-1.2.mga5 $ php foo.php $ So the update is fine. CC:
(none) =>
lewyssmith An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0203.html Status:
NEW =>
RESOLVED |