1af5232138
Fixes CVE-2018-19518: University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> |
||
---|---|---|
.. | ||
0001-acinclude.m4-don-t-unset-variables.patch | ||
0002-iconv-tweak-iconv-detection.patch | ||
0003-configure-disable-the-phar-tool.patch | ||
0004-OPcache-flock-mechanism-is-obviously-linux-so-force-.patch | ||
0005-ext-fileinfo-config.m4-allow-cache-answer-for-strcas.patch | ||
0006-Call-apxs-with-correct-prefix.patch | ||
Config.ext | ||
Config.in | ||
php-fpm.conf | ||
php.hash | ||
php.mk |