An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://bugs.php.net/bug.php?id=75605 | x_refsource_CONFIRM |
https://usn.ubuntu.com/3646-2/ | vendor-advisory x_refsource_UBUNTU |
http://www.securityfocus.com/bid/104022 | vdb-entry x_refsource_BID |
https://www.debian.org/security/2018/dsa-4240 | vendor-advisory x_refsource_DEBIAN |
https://www.tenable.com/security/tns-2018-12 | x_refsource_CONFIRM |
https://usn.ubuntu.com/3646-1/ | vendor-advisory x_refsource_UBUNTU |
http://php.net/ChangeLog-5.php | x_refsource_CONFIRM |
https://lists.debian.org/debian-lts-announce/2018/05/msg00004.html | mailing-list x_refsource_MLIST |
http://php.net/ChangeLog-7.php | x_refsource_CONFIRM |
https://security.gentoo.org/glsa/201812-01 | vendor-advisory x_refsource_GENTOO |
https://security.netapp.com/advisory/ntap-20180607-0003/ | x_refsource_CONFIRM |
https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html | mailing-list x_refsource_MLIST |
https://access.redhat.com/errata/RHSA-2019:2519 | vendor-advisory x_refsource_REDHAT |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 4.7 | MEDIUM | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
Primary | 2.0 | 1.9 | LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |