Bug 598562 (CVE-2010-2097, MOPS-2010-032, MOPS-2010-033, MOPS-2010-034)
| Summary: | CVE-2010-2097 PHP: iconv_mime_decode(), iconv_substr(), iconv_mime_encode() interruption flaws (MOPS-2010-032 MOPS-2010-033 MOPS-2010-034) | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
| Status: | CLOSED DUPLICATE | QA Contact: | |||||||||
| Severity: | unspecified | Docs Contact: | |||||||||
| Priority: | unspecified | ||||||||||
| Version: | unspecified | CC: | jorton | ||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||
| Target Release: | --- | ||||||||||
| Hardware: | All | ||||||||||
| OS: | Linux | ||||||||||
| Whiteboard: | |||||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||||
| Doc Text: | Story Points: | --- | |||||||||
| Clone Of: | Environment: | ||||||||||
| Last Closed: | 2010-07-26 09:36:56 UTC | Type: | --- | ||||||||
| Regression: | --- | Mount Type: | --- | ||||||||
| Documentation: | --- | CRM: | |||||||||
| Verified Versions: | Category: | --- | |||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||
| Embargoed: | |||||||||||
| Attachments: |
|
||||||||||
|
Description
Jan Lieskovsky
2010-06-01 15:56:58 UTC
Created attachment 418694 [details]
Local copy of MOPS-2010-032.php reproducer
Created attachment 418696 [details]
Local copy of MOPS-2010-033.php reproducer
Created attachment 418697 [details]
Local copy of MOPS-2010-034.php reproducer
Closing this, see bug #617578, comment #3 for more detailed explanation. *** This bug has been marked as a duplicate of bug 169857 *** Statement: Red Hat does not consider interruption issues allowing safe_mode / open_basedir restriction bypass to be security sensitive. For more details see https://bugzilla.redhat.com/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php |