CVE-2011-1148

Publication date 18 March 2011

Last updated 24 July 2024


Ubuntu priority

Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.

Status

Package Ubuntu Release Status
php5 11.10 oneiric
Fixed 5.3.6-13ubuntu1
11.04 natty
Fixed 5.3.5-1ubuntu7.1
10.10 maverick
Fixed 5.3.3-1ubuntu9.4
10.04 LTS lucid
Fixed 5.3.2-1ubuntu4.8
9.10 karmic
Fixed 5.2.10.dfsg.1-2ubuntu6.9
8.04 LTS hardy
Fixed 5.2.4-2ubuntu5.15
6.06 LTS dapper
Fixed 5.1.2-1ubuntu3.22

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
php5

References

Related Ubuntu Security Notices (USN)

Other references