Описание
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
Отчет
Red Hat Product Security has rated this issue as having a security impact of Low, and a future update may address this flaw.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | php | Not affected | ||
Red Hat Enterprise Linux 5 | php53 | Not affected | ||
Red Hat Enterprise Linux 6 | php | Will not fix | ||
Red Hat Enterprise Linux 7 | php | Fix deferred | ||
Red Hat Enterprise Linux 8 | php | Not affected | ||
Red Hat Software Collections | rh-php56-php | Will not fix | ||
Red Hat Software Collections | rh-php70-php | Fix deferred | ||
Red Hat Software Collections for Red Hat Enterprise Linux 7 | rh-php71-php | Fixed | RHSA-2019:2519 | 19.08.2019 |
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS | rh-php71-php | Fixed | RHSA-2019:2519 | 19.08.2019 |
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS | rh-php71-php | Fixed | RHSA-2019:2519 | 19.08.2019 |
Показывать по
Дополнительная информация
Статус:
3.1 Low
CVSS3
Связанные уязвимости
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1 ...
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации
3.1 Low
CVSS3