CVE-2018-10545 (retired)

Priority
Description
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x
before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow
bypassing opcache access controls because fpm_unix.c makes a
PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment)
to obtain sensitive information from the process memory of a second user's
PHP applications by running gcore on the PID of the PHP-FPM worker process.
Assigned-to
mdeslaur
Notes
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.35)
Ubuntu 12.04 ESM (Precise Pangolin):released (5.3.10-1ubuntu3.31)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Patches:
Upstream:https://github.com/php/php-src/commit/d20bebfe1340986f795769e2ad6810f36eadf2ca
Package
Upstream:released (7.0.29)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (7.0.30-0ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Package
Upstream:released (7.1.16)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Package
Upstream:released (7.2.4)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):released (7.2.5-0ubuntu0.18.04.1)
More Information

Updated: 2019-10-09 08:02:38 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)