In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
https://www.tenable.com/security/tns-2017-12
https://www.debian.org/security/2018/dsa-4081
https://security.netapp.com/advisory/ntap-20180112-0001/
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://bugs.php.net/bug.php?id=74145
https://access.redhat.com/errata/RHSA-2018:1296
http://www.securityfocus.com/bid/99553