Table of Contents
Red Hat does not consider this flaw to be a security issue. It is improbable
that a script would accept untrusted user input or unvalidated script input
data and use it to malloc memory, without filtering/sanitizing it, therefore the value used to malloc memory is under the the full control of the script author and no trust boundary is crossed.
CVSS v2 metrics
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Affected Packages State
|Red Hat Enterprise Linux 6||php||Will not fix|
|Red Hat Enterprise Linux 5||php||Will not fix|
|Red Hat Enterprise Linux 5||php53||Will not fix|
|Red Hat Enterprise Linux 4||php||Will not fix|
CVE description copyright © 2017, The MITRE Corporation