CVE-2015-2783

Publication date 17 April 2015

Last updated 24 July 2024


Ubuntu priority

ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.

Status

Package Ubuntu Release Status
php5 14.10 utopic
Fixed 5.5.12+dfsg-2ubuntu4.4
14.04 LTS trusty
Fixed 5.5.9+dfsg-1ubuntu4.9
12.04 LTS precise
Fixed 5.3.10-1ubuntu3.18
10.04 LTS lucid
Fixed 5.3.2-1ubuntu4.30

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
php5

References

Related Ubuntu Security Notices (USN)

Other references