Bug 1104978 (CVE-2014-3981)
Summary: | CVE-2014-3981 php: insecure temporary file use in the configure script | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | fedora, jkurik, jorton, jrusnack, mmaslano, rcollet, vdanen, webstack-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-06-09 12:57:30 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1104981 | ||
Bug Blocks: | 1104983 |
Description
Murray McAllister
2014-06-05 07:13:23 UTC
Created php tracking bugs for this issue: Affects: fedora-all [bug 1104981] CVE-2014-3981 PHP Bug: https://bugs.php.net/bug.php?id=67390 commit: http://git.php.net/?p=php-src.git;a=commitdiff;h=91bcadd85e20e50d3f8c2e9721327681640e6f16 (In reply to Remi Collet from comment #3) > http://git.php.net/?p=php-src.git;a=commitdiff;h=91bcadd The above upstream commit replaced fixed file name with a tmpnam(NULL) call. While this makes it harder to predict temporary file name, it does not fully block the issue. Quoting tmpnam(3) man page for further details: Although tmpnam() generates names that are difficult to guess, it is nevertheless possible that between the time that tmpnam() returns a pathname, and the time that the program opens it, another program might create that pathname using open(2), or create it as a symbolic link. This can lead to security holes. To avoid such possibilities, use the open(2) O_EXCL flag to open the pathname. Or better yet, use mkstemp(3) or tmpfile(3) I assume this make get an incomplete fix CVE if updates are released with the above fix. This problem is in the configure script, which is only executed when compiling PHP. Therefore, this issue does not affect binary packages distributed as part of Red Hat products (or Fedora), and has no impact on customer deployments. This can only affect users rebuilding php packages from source. There is no plan to release Red Hat Security Advisory for this issue. Future product versions, based on fixed upstream PHP versions, are likely to contain the fix in their source code. Statement: This issue did not affect binary PHP packages as shipped with Red Hat Enterprise Linux and Red Hat Software Collections. |