{"id":"USN-3566-2","summary":"php5 vulnerabilities","details":"USN-3566-1 fixed several vulnerabilities in PHP. This update provides\nthe corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.\n\nIt was discovered that PHP incorrectly handled certain files. An attacker\ncould possibly use this issue to access sensitive information.\n(CVE-2018-20783)\n\nIt was discovered that PHP incorrectly handled certain files. An attacker\ncould possibly use this issue to access sensitive information or possibly\ncause a crash, resulting in a denial of service. (CVE-2019-11036)\n\nOriginal advisory details:\n\n It was discovered that PHP incorrectly handled memory when unserializing\n certain data. A remote attacker could use this issue to cause PHP to crash,\n resulting in a denial of service, or possibly execute arbitrary code. This\n issue only affected Ubuntu 12.04 ESM. (CVE-2017-12933)\n\n It was discovered that PHP incorrectly handled locale length. A remote attacker\n could possibly use this issue to cause PHP to crash, resulting in a denial of service.\n This issue only affected Ubuntu 12.04 ESM. (CVE-2017-11362)\n\n It was discovered that PHP incorrectly handled certain stream metadata. A remote\n attacker could possibly use this issue to set arbitrary metadata. This issue only\n affected Ubuntu 12.04 ESM. (CVE-2016-10712)\n","modified":"2026-04-22T09:43:40.044382Z","published":"2019-05-22T11:58:43Z","related":["UBUNTU-CVE-2016-10712","UBUNTU-CVE-2017-11362","UBUNTU-CVE-2017-12933","UBUNTU-CVE-2018-20783","UBUNTU-CVE-2019-11036"],"upstream":["CVE-2016-10712","CVE-2017-11362","CVE-2017-12933","CVE-2018-20783","CVE-2019-11036","UBUNTU-CVE-2016-10712","UBUNTU-CVE-2017-11362","UBUNTU-CVE-2017-12933","UBUNTU-CVE-2018-20783","UBUNTU-CVE-2019-11036"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3566-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10712"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11362"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12933"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20783"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11036"}],"affected":[{"package":{"name":"php5","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/php5@5.5.9+dfsg-1ubuntu4.29+esm2?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.9+dfsg-1ubuntu4.29+esm2"}]}],"versions":["5.5.3+dfsg-1ubuntu2","5.5.3+dfsg-1ubuntu3","5.5.6+dfsg-1ubuntu1","5.5.6+dfsg-1ubuntu2","5.5.8+dfsg-2ubuntu1","5.5.9+dfsg-1ubuntu1","5.5.9+dfsg-1ubuntu2","5.5.9+dfsg-1ubuntu3","5.5.9+dfsg-1ubuntu4","5.5.9+dfsg-1ubuntu4.1","5.5.9+dfsg-1ubuntu4.2","5.5.9+dfsg-1ubuntu4.3","5.5.9+dfsg-1ubuntu4.4","5.5.9+dfsg-1ubuntu4.5","5.5.9+dfsg-1ubuntu4.6","5.5.9+dfsg-1ubuntu4.7","5.5.9+dfsg-1ubuntu4.9","5.5.9+dfsg-1ubuntu4.11","5.5.9+dfsg-1ubuntu4.12","5.5.9+dfsg-1ubuntu4.13","5.5.9+dfsg-1ubuntu4.14","5.5.9+dfsg-1ubuntu4.16","5.5.9+dfsg-1ubuntu4.17","5.5.9+dfsg-1ubuntu4.19","5.5.9+dfsg-1ubuntu4.20","5.5.9+dfsg-1ubuntu4.21","5.5.9+dfsg-1ubuntu4.22","5.5.9+dfsg-1ubuntu4.23","5.5.9+dfsg-1ubuntu4.24","5.5.9+dfsg-1ubuntu4.25","5.5.9+dfsg-1ubuntu4.26","5.5.9+dfsg-1ubuntu4.27","5.5.9+dfsg-1ubuntu4.29","5.5.9+dfsg-1ubuntu4.29+esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libapache2-mod-php5","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"libapache2-mod-php5filter","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"libphp5-embed","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php-pear","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-cgi","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-cli","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-common","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-curl","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-enchant","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-fpm","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-gd","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-gmp","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-intl","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-ldap","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-mysql","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-mysqlnd","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-odbc","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-pgsql","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-pspell","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-readline","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-recode","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-snmp","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-sqlite","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-sybase","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-tidy","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-xmlrpc","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"},{"binary_name":"php5-xsl","binary_version":"5.5.9+dfsg-1ubuntu4.29+esm2"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-20783"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-11036"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3566-2.json"}}],"schema_version":"1.7.5"}