USN-4088-1: PHP vulnerability
php5 vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary
PHP could be made to denial of service, expose sensitive information or execute arbitrary code if it received a specially crafted regular expression.
Software Description
- php5 - HTML-embedded scripting language interpreter
Details
It was discovered that PHP incorrectly handled certain regular expressions. An attacker could possibly use this issue to expose sensitive information, cause a denial of service or execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 14.04 ESM
- libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.29+esm4
- php5-cgi - 5.5.9+dfsg-1ubuntu4.29+esm4
- php5-cli - 5.5.9+dfsg-1ubuntu4.29+esm4
- php5-fpm - 5.5.9+dfsg-1ubuntu4.29+esm4
- php5-xmlrpc - 5.5.9+dfsg-1ubuntu4.29+esm4
- Ubuntu 12.04 ESM
- libapache2-mod-php5 - 5.3.10-1ubuntu3.38
- php5-cgi - 5.3.10-1ubuntu3.38
- php5-cli - 5.3.10-1ubuntu3.38
- php5-fpm - 5.3.10-1ubuntu3.38
- php5-xmlrpc - 5.3.10-1ubuntu3.38
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
from Ubuntu Security Notices https://ift.tt/2GUFQ6P