Summary: | <dev-lang/php-5.3.8: Stack Overflow Vulnerability in socket_connect() (CVE-2011-1938) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | ago, alexanderyt, hollow, php-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://svn.php.net/viewvc?view=revision&revision=311369 | ||
Whiteboard: | A1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
![]() CVE-2011-1938 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1938): Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket. I checked manually php-5.3.8 sources, and the commit at $URL seems applied. =dev-lang/php-5.3.8 is stable on all arches. So, as per A1 one of you can add glsa request. Thanks, everyone. Added to existing GLSA request. This issue was resolved and addressed in GLSA 201110-06 at http://security.gentoo.org/glsa/glsa-201110-06.xml by GLSA coordinator Tobias Heinlein (keytoaster). |