{"id":"USN-3045-1","summary":"php5, php7.0 vulnerabilities","details":"It was discovered that PHP incorrectly handled certain SplMinHeap::compare\noperations. A remote attacker could use this issue to cause PHP to crash,\nresulting in a denial of service, or possibly execute arbitrary code. This\nissue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-4116)\n\nIt was discovered that PHP incorrectly handled recursive method calls. A\nremote attacker could use this issue to cause PHP to crash, resulting in a\ndenial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu\n14.04 LTS. (CVE-2015-8873)\n\nIt was discovered that PHP incorrectly validated certain Exception objects\nwhen unserializing data. A remote attacker could use this issue to cause\nPHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04\nLTS. (CVE-2015-8876)\n\nIt was discovered that PHP header() function performed insufficient\nfiltering for Internet Explorer. A remote attacker could possibly use this\nissue to perform a XSS attack. This issue only affected Ubuntu 12.04 LTS\nand Ubuntu 14.04 LTS. (CVE-2015-8935)\n\nIt was discovered that PHP incorrectly handled certain locale operations.\nAn attacker could use this issue to cause PHP to crash, resulting in a\ndenial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu\n14.04 LTS. (CVE-2016-5093)\n\nIt was discovered that the PHP php_html_entities() function incorrectly\nhandled certain string lengths. A remote attacker could use this issue to\ncause PHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04\nLTS. (CVE-2016-5094, CVE-2016-5095)\n\nIt was discovered that the PHP fread() function incorrectly handled certain\nlengths. An attacker could use this issue to cause PHP to crash, resulting\nin a denial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5096)\n\nIt was discovered that the PHP FastCGI Process Manager (FPM) SAPI\nincorrectly handled memory in the access logging feature. An attacker could\nuse this issue to cause PHP to crash, resulting in a denial of service, or\npossibly expose sensitive information. This issue only affected Ubuntu\n12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5114)\n\nIt was discovered that PHP would not protect applications from contents of\nthe HTTP_PROXY environment variable when based on the contents of the Proxy\nheader from HTTP requests. A remote attacker could possibly use this issue\nin combination with scripts that honour the HTTP_PROXY variable to redirect\noutgoing HTTP requests. (CVE-2016-5385)\n\nHans Jerry Illikainen discovered that the PHP bzread() function incorrectly\nperformed error handling. A remote attacker could use this issue to cause\nPHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2016-5399)\n\nIt was discovered that certain PHP multibyte string functions incorrectly\nhandled memory. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 14.04 LTS. (CVE-2016-5768)\n\nIt was discovered that the PHP Mcrypt extension incorrectly handled memory.\nA remote attacker could use this issue to cause PHP to crash, resulting in\na denial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-5769)\n\nIt was discovered that the PHP garbage collector incorrectly handled\ncertain objects when unserializing malicious data. A remote attacker could\nuse this issue to cause PHP to crash, resulting in a denial of service, or\npossibly execute arbitrary code. This issue was only addressed in Ubuntu\nUbuntu 14.04 LTS. (CVE-2016-5771, CVE-2016-5773)\n\nIt was discovered that PHP incorrectly handled memory when unserializing\nmalicious xml data. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.\n(CVE-2016-5772)\n\nIt was discovered that the PHP php_url_parse_ex() function incorrectly\nhandled string termination. A remote attacker could use this issue to cause\nPHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04\nLTS. (CVE-2016-6288)\n\nIt was discovered that PHP incorrectly handled path lengths when extracting\ncertain Zip archives. A remote attacker could use this issue to cause PHP\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode. (CVE-2016-6289)\n\nIt was discovered that PHP incorrectly handled session deserialization. A\nremote attacker could use this issue to cause PHP to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2016-6290)\n\nIt was discovered that PHP incorrectly handled exif headers when processing\ncertain JPEG images. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. (CVE-2016-6291, CVE-2016-6292)\n\nIt was discovered that PHP incorrectly handled certain locale operations. A\nremote attacker could use this issue to cause PHP to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2016-6294)\n\nIt was discovered that the PHP garbage collector incorrectly handled\ncertain objects when unserializing SNMP data. A remote attacker could use\nthis issue to cause PHP to crash, resulting in a denial of service, or\npossibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS\nand Ubuntu 16.04 LTS. (CVE-2016-6295)\n\nIt was discovered that the PHP xmlrpc_encode_request() function incorrectly\nhandled certain lengths. An attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. (CVE-2016-6296)\n\nIt was discovered that the PHP php_stream_zip_opener() function incorrectly\nhandled memory. An attacker could use this issue to cause PHP to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2016-6297)\n","modified":"2026-02-10T04:41:01Z","published":"2016-08-02T15:44:36Z","related":["UBUNTU-CVE-2015-4116","UBUNTU-CVE-2015-8873","UBUNTU-CVE-2015-8876","UBUNTU-CVE-2015-8935","UBUNTU-CVE-2016-5093","UBUNTU-CVE-2016-5094","UBUNTU-CVE-2016-5095","UBUNTU-CVE-2016-5096","UBUNTU-CVE-2016-5114","UBUNTU-CVE-2016-5385","UBUNTU-CVE-2016-5399","UBUNTU-CVE-2016-5768","UBUNTU-CVE-2016-5769","UBUNTU-CVE-2016-5771","UBUNTU-CVE-2016-5772","UBUNTU-CVE-2016-5773","UBUNTU-CVE-2016-6288","UBUNTU-CVE-2016-6289","UBUNTU-CVE-2016-6290","UBUNTU-CVE-2016-6291","UBUNTU-CVE-2016-6292","UBUNTU-CVE-2016-6294","UBUNTU-CVE-2016-6295","UBUNTU-CVE-2016-6296","UBUNTU-CVE-2016-6297"],"upstream":["CVE-2015-4116","CVE-2015-8873","CVE-2015-8876","CVE-2015-8935","CVE-2016-5093","CVE-2016-5094","CVE-2016-5095","CVE-2016-5096","CVE-2016-5114","CVE-2016-5385","CVE-2016-5399","CVE-2016-5768","CVE-2016-5769","CVE-2016-5771","CVE-2016-5772","CVE-2016-5773","CVE-2016-6288","CVE-2016-6289","CVE-2016-6290","CVE-2016-6291","CVE-2016-6292","CVE-2016-6294","CVE-2016-6295","CVE-2016-6296","CVE-2016-6297","UBUNTU-CVE-2015-4116","UBUNTU-CVE-2015-8873","UBUNTU-CVE-2015-8876","UBUNTU-CVE-2015-8935","UBUNTU-CVE-2016-5093","UBUNTU-CVE-2016-5094","UBUNTU-CVE-2016-5095","UBUNTU-CVE-2016-5096","UBUNTU-CVE-2016-5114","UBUNTU-CVE-2016-5385","UBUNTU-CVE-2016-5399","UBUNTU-CVE-2016-5768","UBUNTU-CVE-2016-5769","UBUNTU-CVE-2016-5771","UBUNTU-CVE-2016-5772","UBUNTU-CVE-2016-5773","UBUNTU-CVE-2016-6288","UBUNTU-CVE-2016-6289","UBUNTU-CVE-2016-6290","UBUNTU-CVE-2016-6291","UBUNTU-CVE-2016-6292","UBUNTU-CVE-2016-6294","UBUNTU-CVE-2016-6295","UBUNTU-CVE-2016-6296","UBUNTU-CVE-2016-6297"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3045-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-4116"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8873"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8876"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8935"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5093"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5094"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5095"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5096"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5114"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5385"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5399"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5768"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5769"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5771"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5772"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5773"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6288"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6289"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6290"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6291"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6292"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6294"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6295"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6296"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6297"}],"affected":[{"package":{"name":"php5","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/php5@5.5.9+dfsg-1ubuntu4.19?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.9+dfsg-1ubuntu4.19"}]}],"versions":["5.5.3+dfsg-1ubuntu2","5.5.3+dfsg-1ubuntu3","5.5.6+dfsg-1ubuntu1","5.5.6+dfsg-1ubuntu2","5.5.8+dfsg-2ubuntu1","5.5.9+dfsg-1ubuntu1","5.5.9+dfsg-1ubuntu2","5.5.9+dfsg-1ubuntu3","5.5.9+dfsg-1ubuntu4","5.5.9+dfsg-1ubuntu4.1","5.5.9+dfsg-1ubuntu4.2","5.5.9+dfsg-1ubuntu4.3","5.5.9+dfsg-1ubuntu4.4","5.5.9+dfsg-1ubuntu4.5","5.5.9+dfsg-1ubuntu4.6","5.5.9+dfsg-1ubuntu4.7","5.5.9+dfsg-1ubuntu4.9","5.5.9+dfsg-1ubuntu4.11","5.5.9+dfsg-1ubuntu4.12","5.5.9+dfsg-1ubuntu4.13","5.5.9+dfsg-1ubuntu4.14","5.5.9+dfsg-1ubuntu4.16","5.5.9+dfsg-1ubuntu4.17"],"ecosystem_specific":{"binaries":[{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"libapache2-mod-php5"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"libapache2-mod-php5filter"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"libphp5-embed"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php-pear"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-cgi"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-cli"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-common"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-curl"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-dev"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-enchant"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-fpm"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-gd"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-gmp"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-intl"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-ldap"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-mysql"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-mysqlnd"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-odbc"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-pgsql"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-pspell"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-readline"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-recode"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-snmp"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-sqlite"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-sybase"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-tidy"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-xmlrpc"},{"binary_version":"5.5.9+dfsg-1ubuntu4.19","binary_name":"php5-xsl"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3045-1.json","cves_map":{"cves":[{"id":"CVE-2015-4116","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2015-8873","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2015-8876","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2015-8935","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5093","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-5094","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-5095","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-5096","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-5114","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-5385","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5399","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5768","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5769","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5771","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-5772","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5773","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-6288","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6289","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6290","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6291","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6292","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6294","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6295","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6296","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6297","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}},{"package":{"name":"php7.0","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/php7.0@7.0.8-0ubuntu0.16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.8-0ubuntu0.16.04.2"}]}],"versions":["7.0.1-5","7.0.1-6","7.0.2-1","7.0.2-3","7.0.2-4","7.0.2-5","7.0.3-2","7.0.3-3","7.0.3-9ubuntu1","7.0.4-5ubuntu1","7.0.4-5ubuntu2","7.0.4-7ubuntu1","7.0.4-7ubuntu2","7.0.4-7ubuntu2.1","7.0.8-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"libapache2-mod-php7.0"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"libphp7.0-embed"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-bcmath"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-bz2"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-cgi"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-cli"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-common"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-curl"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-dba"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-dev"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-enchant"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-fpm"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-gd"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-gmp"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-imap"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-interbase"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-intl"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-json"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-ldap"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-mbstring"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-mcrypt"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-mysql"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-odbc"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-opcache"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-pgsql"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-phpdbg"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-pspell"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-readline"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-recode"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-snmp"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-soap"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-sqlite3"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-sybase"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-tidy"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-xml"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-xmlrpc"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-xsl"},{"binary_version":"7.0.8-0ubuntu0.16.04.2","binary_name":"php7.0-zip"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3045-1.json","cves_map":{"cves":[{"id":"CVE-2016-5385","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-5399","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6289","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6290","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6291","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6292","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6294","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6295","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6296","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-6297","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}