CVE-2017-11143

Priority
Medium
Description
In PHP before 5.6.31, an invalid free in the WDDX deserialization of
boolean parameters could be used by attackers able to inject XML for
deserialization to crash the PHP interpreter, related to an invalid free
for an empty boolean element in ext/wddx/wddx.c.
References
Bugs
Notes
 mdeslaur> only affected 5.6
Package
Source: php5 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 LTS (Trusty Tahr):released (5.5.9+dfsg-1ubuntu4.22)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=f269cdcd4f76accbecd03884f327cffb9a7f1ca9
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):not-affected (5.6 only)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (5.6 only)
Ubuntu 17.04 (Zesty Zapus):not-affected (5.6 only)
More Information

Updated: 2017-08-11 23:24:35 UTC (commit 13081)