First published: Mon Mar 07 2022(Updated: )
USN-5300-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 21.10. Original advisory details: It was discovered that PHP incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. (CVE-2015-9253, CVE-2017-8923, CVE-2017-9118, CVE-2017-9120) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service, or possibly obtain sensitive information. (CVE-2017-9119) It was discovered that PHP incorrectly handled certain scripts with XML parsing functions. An attacker could possibly use this issue to obtain sensitive information. (CVE-2021-21707)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/php8.0-fpm | <8.0.8-1ubuntu0.3 | 8.0.8-1ubuntu0.3 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/php8.0-cli | <8.0.8-1ubuntu0.3 | 8.0.8-1ubuntu0.3 |
Ubuntu Ubuntu | =21.10 | |
All of | ||
ubuntu/php8.0-cgi | <8.0.8-1ubuntu0.3 | 8.0.8-1ubuntu0.3 |
Ubuntu Ubuntu | =21.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of the PHP vulnerabilities is USN-5300-3.
The severity of USN-5300-3 is not specified.
An attacker can exploit the PHP vulnerabilities to cause a denial of service.
PHP versions 8.0.8-1ubuntu0.3 are affected by USN-5300-3.
To fix the PHP vulnerabilities, update to version 8.0.8-1ubuntu0.3 of php8.0-fpm, php8.0-cli, and php8.0-cgi.