{"id":"CVE-2016-3132","details":"Double free vulnerability in the SplDoublyLinkedList::offsetSet function in ext/spl/spl_dllist.c in PHP 7.x before 7.0.6 allows remote attackers to execute arbitrary code via a crafted index.","modified":"2026-04-11T03:43:44.511544Z","published":"2016-08-07T10:59:04.663Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/92356"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2016-3132"},{"type":"FIX","url":"http://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5?w=1"},{"type":"FIX","url":"https://php.net/ChangeLog-7.php"},{"type":"EVIDENCE","url":"https://bugs.php.net/bug.php?id=71735"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"4054ec69da7631046f19d54ab06f09728a208b8b"},{"introduced":"0"},{"last_affected":"038c63cdea0472176ec2fdb162cfbd96e8c5f83e"},{"introduced":"0"},{"last_affected":"4e1b8701573698f56e12672e4991d7e6239138d2"},{"introduced":"0"},{"last_affected":"e09845d32614a19188632f410316478fbb440ebd"},{"introduced":"0"},{"last_affected":"249a8fd9ae2324c84ede7ecfca6f6026e6d87df6"},{"fixed":"28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0.0"},{"introduced":"0"},{"last_affected":"7.0.1"},{"introduced":"0"},{"last_affected":"7.0.2"},{"introduced":"0"},{"last_affected":"7.0.3"},{"introduced":"0"},{"last_affected":"7.0.4"},{"introduced":"0"},{"last_affected":"7.0.5"}]}}],"versions":["POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","php-7.0.0","php-7.0.0RC1","php-7.0.0RC2","php-7.0.0RC3","php-7.0.0RC4","php-7.0.0RC5","php-7.0.0RC6","php-7.0.0RC7","php-7.0.0RC8","php-7.0.0alpha1","php-7.0.0alpha2","php-7.0.0beta1","php-7.0.0beta2","php-7.0.0beta3","php-7.0.1","php-7.0.1RC1","php-7.0.2","php-7.0.2RC1","php-7.0.3","php-7.0.4","php-7.0.4RC1","php-7.0.5","php-7.0.5RC1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3132.json","vanir_signatures":[{"target":{"file":"ext/spl/spl_dllist.c"},"signature_version":"v1","id":"CVE-2016-3132-80891d30","source":"https://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5","digest":{"threshold":0.9,"line_hashes":["319179387729034841274760469604206168445","48832863698665694236481967152139719407","59111686446782427339145098948808976296","261215441993593876712539833676253033257"]},"signature_type":"Line","deprecated":false},{"target":{"file":"ext/spl/spl_dllist.c","function":"SPL_METHOD"},"signature_version":"v1","id":"CVE-2016-3132-89df2204","source":"https://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5","digest":{"length":864,"function_hash":"1131720695874403450086703265789160689"},"signature_type":"Function","deprecated":false}],"vanir_signatures_modified":"2026-04-11T03:43:44Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}