Back to bug 1297720

Who When What Removed Added
Adam Mariš 2016-01-12 10:17:59 UTC Depends On 1297722
Adam Mariš 2016-01-12 10:38:43 UTC Blocks 1297732
Salvatore Bonaccorso 2016-01-12 20:40:13 UTC CC carnil
Cedric Buissart 2016-01-29 10:33:54 UTC Whiteboard impact=important,public=20151007,reported=20160107,source=upstream,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cwe=CWE-416,rhel-5/php=affected,rhel-5/php53=affected,rhel-6/php=affected,rhel-7/php=affected,rhscl-2/php54-php=affected,rhscl-2/php55-php=affected,rhscl-2/rh-php56-php=affected,openshift-enterprise-2/php=affected,fedora-all/php=affected impact=moderate,public=20151007,reported=20160107,source=upstream,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cwe=CWE-416,rhel-5/php=affected,rhel-5/php53=affected,rhel-6/php=affected,rhel-7/php=affected,rhscl-2/php54-php=affected,rhscl-2/php55-php=affected,rhscl-2/rh-php56-php=affected,openshift-enterprise-2/php=affected,fedora-all/php=affected
Cedric Buissart 2016-01-29 10:34:03 UTC Severity high medium
Cedric Buissart 2016-01-29 10:34:11 UTC Priority high medium
Cedric Buissart 2016-01-29 10:54:34 UTC Whiteboard impact=moderate,public=20151007,reported=20160107,source=upstream,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cwe=CWE-416,rhel-5/php=affected,rhel-5/php53=affected,rhel-6/php=affected,rhel-7/php=affected,rhscl-2/php54-php=affected,rhscl-2/php55-php=affected,rhscl-2/rh-php56-php=affected,openshift-enterprise-2/php=affected,fedora-all/php=affected impact=moderate,public=20151007,reported=20160107,source=upstream,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-416,rhel-5/php=affected,rhel-5/php53=affected,rhel-6/php=affected,rhel-7/php=affected,rhscl-2/php54-php=affected,rhscl-2/php55-php=affected,rhscl-2/rh-php56-php=affected,openshift-enterprise-2/php=affected,fedora-all/php=affected
Cedric Buissart 2016-02-02 13:46:03 UTC CC cbuissar
Cedric Buissart 2016-02-03 13:02:35 UTC Whiteboard impact=moderate,public=20151007,reported=20160107,source=upstream,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-416,rhel-5/php=affected,rhel-5/php53=affected,rhel-6/php=affected,rhel-7/php=affected,rhscl-2/php54-php=affected,rhscl-2/php55-php=affected,rhscl-2/rh-php56-php=affected,openshift-enterprise-2/php=affected,fedora-all/php=affected impact=moderate,public=20151007,reported=20160107,source=upstream,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-416,rhel-5/php=wontfix,rhel-5/php53=wontfix,rhel-6/php=wontfix,rhel-7/php=wontfix,rhscl-2/php54-php=wontfix,rhscl-2/php55-php=wontfix,rhscl-2/rh-php56-php=wontfix,openshift-enterprise-2/php=affected,fedora-all/php=affected
Cedric Buissart 2016-02-03 13:02:52 UTC Status NEW CLOSED
Resolution --- WONTFIX
Last Closed 2016-02-03 08:02:52 UTC
Cedric Buissart 2016-02-17 15:03:27 UTC Doc Text A use-after-free flaw was found in the php_wddx_pop_element() function of PHP's WDDX extension. Unserializing specially crafted input could cause a PHP application to crash or, possibly, execute arbitrary code.
Product Security DevOps Team 2019-09-29 13:41:49 UTC Whiteboard impact=moderate,public=20151007,reported=20160107,source=upstream,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-416,rhel-5/php=wontfix,rhel-5/php53=wontfix,rhel-6/php=wontfix,rhel-7/php=wontfix,rhscl-2/php54-php=wontfix,rhscl-2/php55-php=wontfix,rhscl-2/rh-php56-php=wontfix,openshift-enterprise-2/php=affected,fedora-all/php=affected

Back to bug 1297720