A vulnerability was found in function str_ireplace, where the third arguments type $subject is not checked. It is possible to control assembly registers, which could lead to arbitrary code execution. Affected version is php 7.0. CVE assignment: http://seclists.org/oss-sec/2015/q3/411 Upstream patch: https://github.com/php/php-src/commit/6aeee47b2cd47915ccfa3b41433a3f57aea24dd5 Upstream bug: https://bugs.php.net/bug.php?id=70140 External reference: (none)
Created php tracking bugs for this issue: Affects: fedora-all [bug 1256315]
Statement: This issue did not affect the versions of php and php53 as shipped with Red Hat Enterprise Linux 5 and the versions of php as shipped with Red Hat Enterprise Linux 6 and 7.
Seems like this is a PHP7 only issue. None of the php versions we ship should be affected.