DescriptionThe mod_php module for the Apache HTTP Server allows local users with write access to PHP scripts to send signals to the server's process group and use the server's file descriptors, as demonstrated by sending a STOP signal, then intercepting incoming connections on the server's TCP port. NOTE: the PHP developer has disputed this vulnerability, saying "The opened file descriptors are opened by Apache. It is the job of Apache to protect them ... Not a bug in PHP.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)buster2.4.38-3+deb10u8vulnerable
buster (security)2.4.59-1~deb10u1vulnerable
bullseye (security)2.4.59-1~deb11u1vulnerable
bookworm (security)2.4.59-1~deb12u1vulnerable
sid, trixie2.4.59-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


More of an apache flaw than a php flaw. And just one more reason
why you have lost as soon as an attacker can execute arbitrary
php scripts.
Probably an unfixable design flaw. But if you can execute a malicious
program, you can do $BADSTUFF anyway.

Search for package or bug name: Reporting problems