** Summary changed:

- [MRE] Please update to latest upstream release 7.0.27
+ [MRE] Please update to latest upstream release 7.0.28

** Description changed:

  PHP 7.0.25 was tentatively SRU'ed to Xenial (LP: #1724896). During the
  process, upstream put out 2 more microversions addressing security
  issues and other bug fixes. Here is a list of the CVEs addressed by
  those:
  
  PHP 7.0.26 (23 Nov 2017):
  
  * No CVE addressed
  
  PHP 7.0.27 (04 Jan 2018):
  
  * https://bugs.php.net/bug.php?id=64938 / 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866
  * https://bugs.php.net/bug.php?id=75571 / 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711
  * https://bugs.php.net/bug.php?id=74782 / 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
  
+ PHP 7.0.28 (01 Mar 2018):
+ 
+ * https://bugs.php.net/bug.php?id=75981 / https://cve.mitre.org/cgi-
+ bin/cvename.cgi?name=CVE-2018-7584
+ 
  Changelog: https://secure.php.net/ChangeLog-7.php

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1744148

Title:
  [MRE] Please update to latest upstream release 7.0.28

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1744148/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to