USN-3566-1: PHP vulnerabilities
Publication date
12 February 2018
Overview
Several security issues were fixed in PHP.
Releases
Packages
- php5 - HTML-embedded scripting language interpreter
Details
It was discovered that PHP incorrectly handled the PHAR 404 error page. A
remote attacker could possibly use this issue to conduct cross-site
scripting (XSS) attacks. (CVE-2018-5712)
It was discovered that PHP incorrectly handled memory when unserializing
certain data. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2017-12933)
It was discovered that PHP incorrectly handled ‘front of’ and ‘back of’
date directives. A remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2017-16642)
It was discovered that PHP incorrectly handled the PHAR 404 error page. A
remote attacker could possibly use this issue to conduct cross-site
scripting (XSS) attacks. (CVE-2018-5712)
It was discovered that PHP incorrectly handled memory when unserializing
certain data. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2017-12933)
It was discovered that PHP incorrectly handled ‘front of’ and ‘back of’
date directives. A remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2017-16642)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
14.04 trusty | libapache2-mod-php5 – 5.5.9+dfsg-1ubuntu4.23 | ||
php5-cgi – 5.5.9+dfsg-1ubuntu4.23 | |||
php5-cli – 5.5.9+dfsg-1ubuntu4.23 | |||
php5-fpm – 5.5.9+dfsg-1ubuntu4.23 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.