Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-2787

Published: 30 March 2015

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.

Priority

Medium

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
lucid
Released (5.3.2-1ubuntu4.30)
precise
Released (5.3.10-1ubuntu3.18)
trusty
Released (5.5.9+dfsg-1ubuntu4.9)
upstream
Released (5.6.7)
utopic
Released (5.5.12+dfsg-2ubuntu4.4)
Patches:
upstream: https://github.com/php/php-src/commit/780222f97f47644a6a118ada86a269a96a1e8134
upstream: https://github.com/php/php-src/commit/d76b293ac71aa5bd4e9a433192afef6e0dd5a4ee
upstream: https://github.com/php/php-src/commit/646572d6d3847d68124b03936719f60936b49a38
upstream: https://github.com/php/php-src/commit/8b14d3052ffcffa17d6e2be652f20e18f8f562ad