A double-free flaw was found in PHP in the zend_ts_hash_graceful_destroy() function. This issue affects all versions of PHP. Initial investigations suggests that it may not be exploitable and can only result in a crash. References: Upstream bug: https://bugs.php.net/bug.php?id=68676 Commits: http://git.php.net/?p=php-src.git;a=commit;h=2bcf69d073190e4f032d883f3416dea1b027a39e http://git.php.net/?p=php-src.git;a=commit;h=24125f0f26f3787c006e4a51611ba33ee3b841cb http://git.php.net/?p=php-src.git;a=commit;h=fbf3a6bc1abcc8a5b5226b0ad9464c37f11ddbd6
As this code is ZTS specific, it only affects ZTS enabled build. (in RHEL, only php/rhel-6 have ZTS build, provided as experimental)
(In reply to Remi Collet from comment #1) > As this code is ZTS specific, it only affects ZTS enabled build. > (in RHEL, only php/rhel-6 have ZTS build, provided as experimental) And what about Fedora builds, are these ZTS enabled too?
(In reply to Vasyl Kaigorodov from comment #2) > And what about Fedora builds, are these ZTS enabled too? Yes, Fedora build have ZTS.
Created php tracking bugs for this issue: Affects: fedora-all [bug 1178728]
Statement: This issue did not affect the versions of php and php53 as shipped with Red Hat Enterprise Linux 5, and the versions of php as shipped with Red Hat Enterprise Linux 7.
Fixed upstream in PHP 5.6.5 and 5.5.21: http://php.net/ChangeLog-5.php#5.5.21 http://php.net/ChangeLog-5.php#5.6.5
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:1218 https://rhn.redhat.com/errata/RHSA-2015-1218.html