CVE-2010-1915

Publication date 12 May 2010

Last updated 24 July 2024


Ubuntu priority

Description

The preg_quote function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature, modification of ZVALs whose values are not updated in the associated local variables, and access of previously-freed memory.

Read the notes from the security team

Status

Package Ubuntu Release Status
php5 10.04 LTS lucid Ignored
9.10 karmic Ignored
9.04 jaunty Ignored
8.04 LTS hardy Ignored
6.06 LTS dapper Ignored

Notes


mdeslaur

see CVE-2010-1864 for patch interruption issue, safe_mode - open_basedir bypass, ignoring This is MOPS-2010-017