CVE-2015-0231

Priority
Description
Use-after-free vulnerability in the process_nested_data function in
ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21,
and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code
via a crafted unserialize call that leverages improper handling of
duplicate numerical keys within the serialized properties of an object.
NOTE: this vulnerability exists because of an incomplete fix for
CVE-2014-8142.
Assigned-to
mdeslaur
Notes
mdeslaurincomplete fix of CVE-2014-8142
Package
Source: php5 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):released (5.5.9+dfsg-1ubuntu4.6)
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=b585a3aed7880a5fa5c18e2b838fc96f40e075bd
More Information

Updated: 2020-09-10 04:34:01 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)