Bug 987580 - (CVE-2016-6128) VUL-1: CVE-2016-6128: php: Invalid color index not properly handled
(CVE-2016-6128)
VUL-1: CVE-2016-6128: php: Invalid color index not properly handled
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/170569/
CVSSv2:SUSE:CVE-2016-6128:4.3:(AV:N/A...
:
Depends on:
Blocks: 991710
  Show dependency treegraph
 
Reported: 2016-07-04 14:26 UTC by Andreas Stieger
Modified: 2018-11-01 07:44 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2016-07-04 14:26:56 UTC
http://seclists.org/oss-sec/2016/q2/627

    There is currently PHP upstream bug which is still marked as private:

    https://bugs.php.net/bug.php?id=72494

    But the libgd project references the following set of commits to this
    bug report:

    https://github.com/libgd/libgd/compare/3fe0a71...6ff72ae

    indicating that libgd does not properly handle invalid color index,
    which could lead to a denial of service against applications using the
    libgd library (in particular thus PHP).


    https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61
    gd_crop.c
    gdImageCropThreshold

    + if (color < 0 || (!gdImageTrueColor(im) && color >= gdImageColorsTotal(im))) {
    + return NULL;
    + }

    https://github.com/libgd/libgd/commit/6ff72ae40c7c20ece939afb362d98cc37f4a1c96
    tests/gdimagecrop/php_bug_72494.c

    im = gdImageCreate(50, 50);
    gdImageCropThreshold(im, 1337, 0);
    gdImageDestroy(im);



https://github.com/libgd/libgd/compare/3fe0a7128bac5000fdcfab888bd2a75ec0c9447d...fd623025505e87bba7ec8555eeb72dae4fb0afd


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1351603
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6128
http://seclists.org/oss-sec/2016/q2/627
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-6128.html
Comment 1 Swamp Workflow Management 2016-07-04 22:01:17 UTC
bugbot adjusting priority
Comment 2 Petr Gajdos 2016-08-02 08:33:41 UTC
Extracting useful info:

https://github.com/libgd/libgd/compare/3fe0a71...6ff72ae
Comment 3 Petr Gajdos 2016-08-02 08:34:25 UTC
Could you please file another bug against gd, thanks!
Comment 4 Petr Gajdos 2016-08-02 10:08:04 UTC
Could you please explain me how the color could be less than zero?
Comment 5 Petr Gajdos 2016-08-02 12:06:03 UTC
php git does not have the check, I will use the patch from gd upstream. Could you please contact php security team? Thanks!
Comment 6 Petr Gajdos 2016-08-02 12:30:16 UTC
11sp3/php53 and later is not affected.
Comment 7 Sebastian Krahmer 2016-08-02 13:32:20 UTC
(In reply to Petr Gajdos from comment #5)
> php git does not have the check, I will use the patch from gd upstream.
> Could you please contact php security team? Thanks!

Contact php about what? Opening the upstream bug?
Comment 8 Petr Gajdos 2016-08-04 08:54:24 UTC
I believe all affected code streams fixed.
Comment 9 Bernhard Wiedemann 2016-08-04 10:00:58 UTC
This is an autogenerated message for OBS integration:
This bug (987580) was mentioned in
https://build.opensuse.org/request/show/416889 13.2 / php5
Comment 12 Swamp Workflow Management 2016-08-15 13:08:47 UTC
openSUSE-SU-2016:2071-1: An update that fixes 12 vulnerabilities is now available.

Category: security (moderate)
Bug References: 987580,988032,991422,991424,991426,991427,991428,991429,991430,991433,991434,991437
CVE References: CVE-2016-5399,CVE-2016-6128,CVE-2016-6161,CVE-2016-6207,CVE-2016-6288,CVE-2016-6289,CVE-2016-6290,CVE-2016-6291,CVE-2016-6292,CVE-2016-6295,CVE-2016-6296,CVE-2016-6297
Sources used:
openSUSE 13.2 (src):    php5-5.6.1-72.1
Comment 14 Swamp Workflow Management 2016-09-28 13:10:08 UTC
SUSE-SU-2016:2408-1: An update that fixes 24 vulnerabilities is now available.

Category: security (important)
Bug References: 987530,987580,988032,991422,991424,991426,991427,991428,991429,991430,991433,991434,991437,997206,997207,997208,997210,997211,997220,997225,997230,997248,997257
CVE References: CVE-2014-3587,CVE-2016-3587,CVE-2016-5399,CVE-2016-6128,CVE-2016-6161,CVE-2016-6207,CVE-2016-6288,CVE-2016-6289,CVE-2016-6290,CVE-2016-6291,CVE-2016-6292,CVE-2016-6295,CVE-2016-6296,CVE-2016-6297,CVE-2016-7124,CVE-2016-7125,CVE-2016-7126,CVE-2016-7127,CVE-2016-7128,CVE-2016-7129,CVE-2016-7130,CVE-2016-7131,CVE-2016-7132,CVE-2016-7134
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    php5-5.5.14-73.1
SUSE Linux Enterprise Module for Web Scripting 12 (src):    php5-5.5.14-73.1
Comment 15 Swamp Workflow Management 2016-10-04 15:11:28 UTC
openSUSE-SU-2016:2451-1: An update that fixes 24 vulnerabilities is now available.

Category: security (important)
Bug References: 987530,987580,988032,991422,991424,991426,991427,991428,991429,991430,991433,991434,991437,997206,997207,997208,997210,997211,997220,997225,997230,997248,997257
CVE References: CVE-2014-3587,CVE-2016-3587,CVE-2016-5399,CVE-2016-6128,CVE-2016-6161,CVE-2016-6207,CVE-2016-6288,CVE-2016-6289,CVE-2016-6290,CVE-2016-6291,CVE-2016-6292,CVE-2016-6295,CVE-2016-6296,CVE-2016-6297,CVE-2016-7124,CVE-2016-7125,CVE-2016-7126,CVE-2016-7127,CVE-2016-7128,CVE-2016-7129,CVE-2016-7130,CVE-2016-7131,CVE-2016-7132,CVE-2016-7134
Sources used:
openSUSE Leap 42.1 (src):    php5-5.5.14-59.1
Comment 16 Andreas Stieger 2016-10-05 15:23:27 UTC
done
Comment 17 Swamp Workflow Management 2016-10-05 19:09:06 UTC
SUSE-SU-2016:2460-1: An update that solves 29 vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 1001950,987580,988032,991422,991424,991426,991427,991428,991429,991430,991434,991437,995512,997206,997207,997208,997210,997211,997220,997225,997230,997247,997248,997257,999313,999679,999680,999684,999685,999819,999820
CVE References: CVE-2016-4473,CVE-2016-5399,CVE-2016-6128,CVE-2016-6161,CVE-2016-6207,CVE-2016-6289,CVE-2016-6290,CVE-2016-6291,CVE-2016-6292,CVE-2016-6295,CVE-2016-6296,CVE-2016-6297,CVE-2016-7124,CVE-2016-7125,CVE-2016-7126,CVE-2016-7127,CVE-2016-7128,CVE-2016-7129,CVE-2016-7130,CVE-2016-7131,CVE-2016-7132,CVE-2016-7133,CVE-2016-7134,CVE-2016-7412,CVE-2016-7413,CVE-2016-7414,CVE-2016-7416,CVE-2016-7417,CVE-2016-7418
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    php7-7.0.7-15.1
SUSE Linux Enterprise Module for Web Scripting 12 (src):    php7-7.0.7-15.1
Comment 18 Swamp Workflow Management 2016-11-01 15:21:49 UTC
SUSE-SU-2016:2460-2: An update that solves 29 vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 1001950,987580,988032,991422,991424,991426,991427,991428,991429,991430,991434,991437,995512,997206,997207,997208,997210,997211,997220,997225,997230,997247,997248,997257,999313,999679,999680,999684,999685,999819,999820
CVE References: CVE-2016-4473,CVE-2016-5399,CVE-2016-6128,CVE-2016-6161,CVE-2016-6207,CVE-2016-6289,CVE-2016-6290,CVE-2016-6291,CVE-2016-6292,CVE-2016-6295,CVE-2016-6296,CVE-2016-6297,CVE-2016-7124,CVE-2016-7125,CVE-2016-7126,CVE-2016-7127,CVE-2016-7128,CVE-2016-7129,CVE-2016-7130,CVE-2016-7131,CVE-2016-7132,CVE-2016-7133,CVE-2016-7134,CVE-2016-7412,CVE-2016-7413,CVE-2016-7414,CVE-2016-7416,CVE-2016-7417,CVE-2016-7418
Sources used:
SUSE Linux Enterprise Module for Web Scripting 12 (src):    php7-7.0.7-15.1
Comment 19 Swamp Workflow Management 2017-01-30 13:29:08 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2017-02-13.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/63367