CVE-2015-7803

Publication date 12 October 2015

Last updated 24 July 2024


Ubuntu priority

The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.

Status

Package Ubuntu Release Status
php5 15.10 wily
Fixed 5.6.11+dfsg-1ubuntu3.1
15.04 vivid
Fixed 5.6.4+dfsg-4ubuntu6.4
14.04 LTS trusty
Fixed 5.5.9+dfsg-1ubuntu4.14
12.04 LTS precise
Fixed 5.3.10-1ubuntu3.21

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
php5

References

Related Ubuntu Security Notices (USN)

Other references