First published: Thu Nov 30 2017(Updated: )
A flaw was found in PHP versions 5.6 and 7.x. After changing UID and GID, PHP-FPM sets pool worker processes to be dumpable. This allows a local user with the same UID and GID to attach to the PHP-FPM workers and gain access to any restricted resources that are not supposed to be allowed. As a result sensitive configuration data for other accounts can be accessed directly in the PHP worker process's memory. References: <a href="https://bugs.php.net/bug.php?id=75605">https://bugs.php.net/bug.php?id=75605</a> Patch: <a href="https://bugs.php.net/patch-display.php?bug_id=75605&patch=bug75605-patch-for-5-6&revision=latest">https://bugs.php.net/patch-display.php?bug_id=75605&patch=bug75605-patch-for-5-6&revision=latest</a> <a href="https://bugs.php.net/patch-display.php?bug_id=75605&patch=bug75605-patch-for-7-0&revision=latest">https://bugs.php.net/patch-display.php?bug_id=75605&patch=bug75605-patch-for-7-0&revision=latest</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php71-php | <0:7.1.30-1.el7 | 0:7.1.30-1.el7 |
PHP PHP | <5.6.35 | |
PHP PHP | >=7.0.0<7.0.29 | |
PHP PHP | >=7.1.0<7.1.16 | |
PHP PHP | >=7.2.0<7.2.4 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Netapp Storage Automation Store | ||
PHP PHP | <7.0.29 | 7.0.29 |
debian/php5 | ||
debian/php7.0 | ||
debian/php7.1 | ||
redhat/php | <5.6.35 | 5.6.35 |
redhat/php | <7.0.29 | 7.0.29 |
redhat/php | <7.1.16 | 7.1.16 |
redhat/php | <7.2.4 | 7.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.