[USN-3646-1] PHP vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============1097069249036563022==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”bsjwpJNrQgu9JBpVKssmfyYsnA0cuAdqA”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–bsjwpJNrQgu9JBpVKssmfyYsnA0cuAdqA
Content-Type: multipart/mixed; boundary=”zwQBSaWzBcCln0jNkKdGJC8HjntnAU3AA”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3646-1] PHP vulnerabilities

–zwQBSaWzBcCln0jNkKdGJC8HjntnAU3AA
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3646-1
May 14, 2018

php5, php7.0, php7.1, php7.2 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
– php7.2: HTML-embedded scripting language interpreter
– php7.1: HTML-embedded scripting language interpreter
– php7.0: HTML-embedded scripting language interpreter
– php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled opcache access controls
when configured to use PHP-FPM. A local user could possibly use this issu=
e
to obtain sensitive information from another user’s PHP applications.
(CVE-2018-10545)

It was discovered that the PHP iconv stream filter incorrect handled
certain invalid multibyte sequences. A remote attacker could possibly use=

this issue to cause PHP to hang, resulting in a denial of service.
(CVE-2018-10546)

It was discovered that the PHP PHAR error pages incorrectly filtered
certain data. A remote attacker could possibly use this issue to perform
a reflected XSS attack. (CVE-2018-10547)

It was discovered that PHP incorrectly handled LDAP. A malicious remote
LDAP server could possibly use this issue to cause PHP to crash, resultin=
g
in a denial of service. (CVE-2018-10548)

It was discovered that PHP incorrectly handled certain exif tags in JPEG
images. A remote attacker could possibly use this issue to cause PHP to
crash, resulting in a denial of service. This issue only affected Ubuntu
16.04 LTS, Ubuntu 17.10, and Ubuntu 18.04 LTS. (CVE-2018-10549)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.5-0ubuntu0.18.04.1
php7.2-cgi 7.2.5-0ubuntu0.18.04.1
php7.2-cli 7.2.5-0ubuntu0.18.04.1
php7.2-fpm 7.2.5-0ubuntu0.18.04.1

Ubuntu 17.10:
libapache2-mod-php7.1 7.1.17-0ubuntu0.17.10.1
php7.1-cgi 7.1.17-0ubuntu0.17.10.1
php7.1-cli 7.1.17-0ubuntu0.17.10.1
php7.1-fpm 7.1.17-0ubuntu0.17.10.1

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.30-0ubuntu0.16.04.1
php7.0-cgi 7.0.30-0ubuntu0.16.04.1
php7.0-cli 7.0.30-0ubuntu0.16.04.1
php7.0-fpm 7.0.30-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.25
php5-cgi 5.5.9+dfsg-1ubuntu4.25
php5-cli 5.5.9+dfsg-1ubuntu4.25
php5-fpm 5.5.9+dfsg-1ubuntu4.25

In Ubuntu 16.04 LTS, Ubuntu 17.10, and Ubuntu 18.04 LTS, this update uses=
a
new upstream release, which includes additional bug fixes.

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3646-1
CVE-2018-10545, CVE-2018-10546, CVE-2018-10547, CVE-2018-10548,
CVE-2018-10549

Package Information:
https://launchpad.net/ubuntu/+source/php7.2/7.2.5-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/php7.1/7.1.17-0ubuntu0.17.10.1
https://launchpad.net/ubuntu/+source/php7.0/7.0.30-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.25

–zwQBSaWzBcCln0jNkKdGJC8HjntnAU3AA–

–bsjwpJNrQgu9JBpVKssmfyYsnA0cuAdqA
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=/JRf
—–END PGP SIGNATURE—–

–bsjwpJNrQgu9JBpVKssmfyYsnA0cuAdqA–

–===============1097069249036563022==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============1097069249036563022==–