CVE-2024-11235

Publication date 14 March 2025

Last updated 31 March 2025


Ubuntu priority

Exception handler frees variables via cleanup_live_vars for termination. However, the subsequent php_request_shutdown performs reference counting on these variables using zend_gc_refcount(read) and zend_gc_delref(write), resulting in use-after-free. Since zend_mm_free_small stores metadata in freed memory chunks, this use-after-free vulnerability may allows manipulation of the Zend allocator through reference count behaviors.

Read the notes from the security team

Status

Package Ubuntu Release Status
php5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
14.04 LTS trusty
Needs evaluation
php7.0 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
16.04 LTS xenial
Needs evaluation
php7.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic
Needs evaluation
php7.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 7.4.3-4ubuntu2.29
php8.1 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Fixed 8.1.2-1ubuntu2.21
20.04 LTS focal Not in release
php8.3 24.10 oracular
Fixed 8.3.11-0ubuntu0.24.10.5
24.04 LTS noble
Fixed 8.3.6-0ubuntu0.24.04.4
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
php8.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release

Notes


sbeattie

PEAR issues should go against php-pear as of xenial