CVE-2015-0231

Publication date 27 January 2015

Last updated 24 July 2024


Ubuntu priority

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.

Read the notes from the security team

Status

Package Ubuntu Release Status
php5 14.10 utopic
Fixed 5.5.12+dfsg-2ubuntu4.2
14.04 LTS trusty
Fixed 5.5.9+dfsg-1ubuntu4.6
12.04 LTS precise
Fixed 5.3.10-1ubuntu3.16
10.04 LTS lucid
Not affected

Notes


mdeslaur

incomplete fix of CVE-2014-8142

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
php5

References

Related Ubuntu Security Notices (USN)

Other references