Summary: | <dev-lang/php-{5.4.28,5.5.12}: privilege escalation in php-fpm due to insecure default config (CVE-2014-0185) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | php-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/04/29/5 | ||
Whiteboard: | A1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-04-30 07:26:57 UTC
5.4.28 and 5.5.12 seems to fix the problem. Is fine to stabilize them? so, is it fine to stablize? (In reply to Matthew Thode ( prometheanfire ) from comment #2) > so, is it fine to stablize? I am sorry this slipped past me. Yes. It is fine to stabilise. Arches, please test and mark stable: =dev-lang/php-5.4.28 =dev-lang/php-5.5.12 Target Keywords : "alpha amd64 arm hppa ia64 ppc ppc64 spark x86" Thank you! Stable for HPPA. amd64 stable arm stable alpha stable ia64 stable ppc64 stable ppc stable sparc stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches, Thank you for your work Maintainer(s), please drop the vulnerable version. Added to existing GLSA Request CVE-2014-0185 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185): sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client. No vulnerable version in 5.4 and 5.5 branch left in tree. 5.3 branch is not treated in this bug but rather in bug 519932 This issue was resolved and addressed in GLSA 201408-11 at http://security.gentoo.org/glsa/glsa-201408-11.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |