Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2016-7479

Published: 11 January 2017

In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
upstream Needs triage

precise
Released (5.3.10-1ubuntu3.26)
trusty
Released (5.5.9+dfsg-1ubuntu4.21)
xenial Does not exist

yakkety Does not exist

Patches:
upstream: http://git.php.net/?p=php-src.git;a=commit;h=0426b916df396a23e5c34514e4f2f0627efdcdf0


php7.0
Launchpad, Ubuntu, Debian
upstream
Released (7.0.15)
precise Does not exist

trusty Does not exist

xenial
Released (7.0.15-0ubuntu0.16.04.2)
yakkety
Released (7.0.15-0ubuntu0.16.10.2)
Patches:

upstream: http://git.php.net/?p=php-src.git;a=commit;h=0426b916df396a23e5c34514e4f2f0627efdcdf0
upstream: http://git.php.net/?p=php-src.git;a=commit;h=b47c49d7a00bc34d7e0f3d72732f66e904da6fa7