Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:90977 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 47345 invoked from network); 27 Jan 2016 12:04:13 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 27 Jan 2016 12:04:13 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.160.173 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.160.173 mail-yk0-f173.google.com Received: from [209.85.160.173] ([209.85.160.173:36263] helo=mail-yk0-f173.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 81/48-28185-C32B8A65 for ; Wed, 27 Jan 2016 07:04:12 -0500 Received: by mail-yk0-f173.google.com with SMTP id v14so237450269ykd.3 for ; Wed, 27 Jan 2016 04:04:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:from:date:message-id:subject:to:content-type; bh=eUMBQibMFgeH+bBaO7fLONxuZxugA2TrJwqfSQ9sTP0=; b=vENq2BTMmy0trYOyjQ+FxawzerYc3fJayCPz5zjSwuuSdi6U8uduLCAwhVaWLEpOcN 0k2XkXbKLrL22E/6RRCnn0d0xWfHQLB/pkcPEbRSVdexnv/jTOTsmWVGJB93RCDGNzvz ZJrcwNhVGhrAhAxRxuaUAT07pqq3afQ4QSKR+RonLyE3fJuPU4ddpDaMEBCHITQ2k9jT 00BMldMw0u7ApNZTWD6kTa1X/4vMgQlFiFh7vIpCIu6l2KxDQuVw95r3cT3wOhEzApCv Skc25hsBV5gw/ZVfazYfbhoXuEMWxQ8bqyWDPzMvo78AqRNNFlHhKGMXktUbBgHqTGhl 2svw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:from:date:message-id:subject :to:content-type; bh=eUMBQibMFgeH+bBaO7fLONxuZxugA2TrJwqfSQ9sTP0=; b=HgCfkDfr7OfbSx5RCr4kbRHYw/iixRTV1yr0IT6oWH6lYOw5c431vd9Vwmg5mKe2+e xX2zvApOhsCKA6RHfTISy4p1zJl5CpUnQeL/sBkUjagy4LGP3n0eHbR3+RM+EKZWobc2 3hyLHZrTtoH3giJJRinmfthhbKTA3m7CsMHyQGMYNISwOAsZGEvlKusjqCwuwKNplel7 8P95wA3LWiQaASPtjg9x2EWncvW4QBHaVIsLrpWH22JrqgcBBgzNTp/0X7YPswDj+nrW /5cYEQuwlNCN8FcDp/RzsH83iBwaUA7vOYxMjedtrirFkFhxflhK5mnskOg0LfyCpfc2 i06A== X-Gm-Message-State: AG10YORIBd/rGyZapm5Z57ytRUwJQXsHi6sQUaLQY6Gd2lnR8dGzMOD6KnPnLywIKB8Vd5OREh+BwL19COGcsA== X-Received: by 10.37.59.20 with SMTP id i20mr14269123yba.27.1453896246898; Wed, 27 Jan 2016 04:04:06 -0800 (PST) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.129.88.139 with HTTP; Wed, 27 Jan 2016 04:03:27 -0800 (PST) Date: Wed, 27 Jan 2016 21:03:27 +0900 X-Google-Sender-Auth: i5PKvafZk9XaU6mxHJiQTB7VJBw Message-ID: To: "internals@lists.php.net" Content-Type: text/plain; charset=UTF-8 Subject: Bug #67383 exec() leaks file and socket descriptors to called program From: yohgaki@ohgaki.net (Yasuo Ohgaki) Hi all, This bug comes to my attention. https://bugs.php.net/bug.php?id=67383 This report includes patch that prevents file descriptor leaks. https://bugs.php.net/patch-display.php?bug_id=67383&patch=SOCK_CLOEXEC-and-FD_CLOEXEC&revision=latest There may be cases that CLOEXEC cannot be applied blindly, but it seems this fixes lots of bugs including very old bugs. Why this patch is not merged and closed? Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net