Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-11235

Опубликовано: 04 апр. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.1

Описание

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

code not present
focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

not-affected

7.4.3-4ubuntu2.29
focal

released

7.4.3-4ubuntu2.29
jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

released

8.1.2-1ubuntu2.21
noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

released

8.3.6-0ubuntu0.24.04.4
oracular

released

8.3.11-0ubuntu0.24.10.5
plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

released

8.4.5-1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

released

8.4.5-1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 56%
0.00343
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
3 месяца назад

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.

CVSS3: 8.1
nvd
3 месяца назад

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.

CVSS3: 8.1
debian
3 месяца назад

In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code seq ...

github
3 месяца назад

Reference counting in php_request_shutdown causes Use-After-Free

CVSS3: 8.1
fstec
3 месяца назад

Уязвимость функции php_request_shutdown интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 56%
0.00343
Низкий

8.1 High

CVSS3

Уязвимость CVE-2024-11235 - exploitDog