CVE-2010-2191

Publication date 8 June 2010

Last updated 24 July 2024


Ubuntu priority

Description

The (1) parse_str, (2) preg_match, (3) unpack, and (4) pack functions; the (5) ZEND_FETCH_RW, (6) ZEND_CONCAT, and (7) ZEND_ASSIGN_CONCAT opcodes; and the (8) ArrayObject::uasort method in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler. NOTE: vectors 2 through 4 are related to the call time pass by reference feature.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
php5 10.04 LTS lucid Ignored
9.10 karmic Ignored
9.04 jaunty Ignored
8.04 LTS hardy Ignored
6.06 LTS dapper Ignored

Notes


mdeslaur

interruption issue, safe_mode - open_basedir bypass, ignoring This is MOPS-2010-049 to MOPS-2010-055

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
php5