Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-7125

Published: 11 September 2016

ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
upstream
Released (5.6.25)
precise
Released (5.3.10-1ubuntu3.25)
trusty
Released (5.5.9+dfsg-1ubuntu4.20)
xenial Does not exist

Patches:
upstream: http://git.php.net/?p=php-src.git;a=commit;h=8763c6090d627d8bb0ee1d030c30e58f406be9ce
upstream: http://git.php.net/?p=php-src.git;a=commit;h=b172f43caa048861899e78eb56607cb5b60e5cfb



php7.0
Launchpad, Ubuntu, Debian
upstream
Released (7.0.10)
precise Does not exist

trusty Does not exist

xenial
Released (7.0.8-0ubuntu0.16.04.3)
Patches:


upstream: http://git.php.net/?p=php-src.git;a=commit;h=8763c6090d627d8bb0ee1d030c30e58f406be9ce
upstream: http://git.php.net/?p=php-src.git;a=commit;h=0d13325b660b5ae64267dffcc9a153c7634fdfe2
upstream: http://git.php.net/?p=php-src.git;a=commit;h=b172f43caa048861899e78eb56607cb5b60e5cfb