CVE-2014-8142

Publication date 20 December 2014

Last updated 24 July 2024


Ubuntu priority

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.

Read the notes from the security team

Status

Package Ubuntu Release Status
php5 14.10 utopic
Fixed 5.5.12+dfsg-2ubuntu4.2
14.04 LTS trusty
Fixed 5.5.9+dfsg-1ubuntu4.6
12.04 LTS precise
Fixed 5.3.10-1ubuntu3.16
10.04 LTS lucid
Not affected

Notes


mdeslaur

unserialize shouldn't be run on untrusted input Patch was incomplete, leading to CVE-2015-0231

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
php5

References

Related Ubuntu Security Notices (USN)

Other references