This bug was fixed in the package php5 - 5.3.10-1ubuntu3.12
---------------
php5 (5.3.10-1ubuntu3.12) precise-security; urgency=medium
* SECURITY UPDATE: incorrect FastCGI socket permissions (LP: #1307027)
- debian/patches/CVE-2014-0185.patch: default to 0660 in
sapi/fpm/fpm/fpm_unix.c, sapi/fpm/php-fpm.conf.in.
- CVE-2014-0185
* SECURITY UPDATE: denial of service in FileInfo cdf_unpack_summary_info
- debian/patches/CVE-2014-0237.patch: remove file_printf calls in
ext/fileinfo/libmagic/cdf.c.
- CVE-2014-0237
* SECURITY UPDATE: denial of service in FileInfo cdf_read_property_info
- debian/patches/CVE-2014-0238.patch: fix infinite loop in
ext/fileinfo/libmagic/cdf.c.
- CVE-2014-0238
* SECURITY UPDATE: code execution via buffer overflow in DNS TXT record
parsing
- debian/patches/CVE-2014-4049.patch: check length in
ext/standard/dns.c.
- CVE-2014-4049
-- Marc Deslauriers <[email protected]> Thu, 19 Jun 2014 13:44:17
-0400
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1307027
Title:
php5-fpm: Possible privilege escalation due to insecure default
permissions of sockets
To manage notifications about this bug go to:
https://bugs.launchpad.net/php/+bug/1307027/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs