~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Candidate: CVE-2015-8617
PublicDate: 2016-01-19
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8617
 https://bugs.php.net/bug.php?id=71105
 https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e (php-7.0.2RC1)
Description:
 Format string vulnerability in the zend_throw_or_error function in
 Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to
 execute arbitrary code via format string specifiers in a string that is
 misused as a class name, leading to incorrect error handling.
Ubuntu-Description:
Notes:
 mdeslaur> only php 7.x
Bugs:
Priority: medium
Discovered-by:
Assigned-to:

Patches_php5:
upstream_php5: needs-triage
precise_php5: not-affected
trusty_php5: not-affected
vivid_php5: not-affected
wily_php5: not-affected
devel_php5: not-affected