Bug 688958 (CVE-2011-1148)
Summary: | CVE-2011-1148 php: use-after-free vulnerability in substr_replace() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | David Kutálek <dkutalek> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | dkutalek, fedora, jorton, luke+redhat, rpm |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | php 5.3.7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-01-19 22:21:33 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 740731, 740732, 740733, 740734, 768025, 769756, 831135 | ||
Bug Blocks: | 715030, 750552 |
Description
Vincent Danen
2011-03-18 16:30:58 UTC
This is corrected in upstream 5.3.7: http://www.php.net/archive/2011.php#id2011-08-18-1 This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2011:1423 https://rhn.redhat.com/errata/RHSA-2011-1423.html This issue did not affect the version of php shipped with Fedora 15 and Fedora 16. (In reply to comment #8) > This issue did not affect the version of php shipped with Fedora 15 and Fedora > 16. It's probably less confusing to say that Fedora 15 and 16 are not affected by this issue as they ship fixed upstream version. F-15, however, included php 5.3.6 at GA and as this issue was first fixed upstream in 5.3.7 (see comment #3), it probably was affected by this issue for some time. Statement: This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 4. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:0033 https://rhn.redhat.com/errata/RHSA-2012-0033.html |