First published: Tue May 15 2018(Updated: )
USN-3600-1 fixed a vulnerability in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that PHP incorrectly handled the PHAR 404 error page. A remote attacker could possibly use this issue to conduct cross-site scripting (XSS) attacks. (CVE-2018-5712) It was discovered that PHP incorrectly handled parsing certain HTTP responses. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-7584)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/php5-cli | <5.3.10-1ubuntu3.30 | 5.3.10-1ubuntu3.30 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/php5 | <5.3.10-1ubuntu3.30 | 5.3.10-1ubuntu3.30 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/libapache2-mod-php5 | <5.3.10-1ubuntu3.30 | 5.3.10-1ubuntu3.30 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/php5-fpm | <5.3.10-1ubuntu3.30 | 5.3.10-1ubuntu3.30 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/php5-cgi | <5.3.10-1ubuntu3.30 | 5.3.10-1ubuntu3.30 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3600-2 is not specified.
USN-3600-2 fixes a vulnerability in PHP.
To mitigate the vulnerability in PHP, update to the specified version or apply the corresponding update for your Ubuntu 12.04 ESM.
The affected software packages by USN-3600-2 are php5-cli, php5, libapache2-mod-php5, php5-fpm, and php5-cgi.
You can find more information about USN-3600-2 on the Ubuntu website.