It was discovered that PHP incorrectly handled certain regular expressions.
An attacker could possibly use this issue to expose sensitive information,
cause a denial of service or execute arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | php5-xmlrpc | < 5.5.9+dfsg-1ubuntu4.29+esm4 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapache2-mod-php5 | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapache2-mod-php5-dbgsym | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapache2-mod-php5filter | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapache2-mod-php5filter-dbgsym | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | libphp5-embed | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | libphp5-embed-dbgsym | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | php5-cgi | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | php5-cgi-dbgsym | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |
Ubuntu | 14.04 | noarch | php5-cli | < 5.5.9+dfsg-1ubuntu4.29 | UNKNOWN |