** Summary changed: - [MRE] Please update to latest upstream release 7.0.27 + [MRE] Please update to latest upstream release 7.0.28
** Description changed: PHP 7.0.25 was tentatively SRU'ed to Xenial (LP: #1724896). During the process, upstream put out 2 more microversions addressing security issues and other bug fixes. Here is a list of the CVEs addressed by those: PHP 7.0.26 (23 Nov 2017): * No CVE addressed PHP 7.0.27 (04 Jan 2018): * https://bugs.php.net/bug.php?id=64938 / https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866 * https://bugs.php.net/bug.php?id=75571 / http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711 * https://bugs.php.net/bug.php?id=74782 / http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712 + PHP 7.0.28 (01 Mar 2018): + + * https://bugs.php.net/bug.php?id=75981 / https://cve.mitre.org/cgi- + bin/cvename.cgi?name=CVE-2018-7584 + Changelog: https://secure.php.net/ChangeLog-7.php -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744148 Title: [MRE] Please update to latest upstream release 7.0.28 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php7.0/+bug/1744148/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
