CVE-2015-4116 (retired)

Priority
Description
Use-after-free vulnerability in the spl_ptr_heap_insert function in
ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows
remote attackers to execute arbitrary code by triggering a failed
SplMinHeap::compare operation.
Notes
 sbeattie> requires malformed php code, which is not usually part of a
threat model (accepting and executing random php statements)
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.11+dfsg-1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=1cbd25ca15383394ffa9ee8601c5de4c0f2f90e1
More Information

Updated: 2019-08-23 09:06:49 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)