[USN-3702-1] PHP vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============5049150669186592677==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”14VFE4ME9vXOYgTbzdb3HW7T9E9jtyeFc”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–14VFE4ME9vXOYgTbzdb3HW7T9E9jtyeFc
Content-Type: multipart/mixed; boundary=”S65DQ4gbfE10HPGza696iNirQ72z8xq9X”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3702-1] PHP vulnerability

–S65DQ4gbfE10HPGza696iNirQ72z8xq9X
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3702-1
July 04, 2018

php7.2 vulnerability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS

Summary:

PHP could be made to crash or run programs if it opened a specially craft=
ed
file.

Software Description:
– php7.2: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled exif tags in certain image=
s.
A remote attacker could use this issue to cause PHP to crash, resulting i=
n
a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.7-0ubuntu0.18.04.1
php7.2-cgi 7.2.7-0ubuntu0.18.04.1
php7.2-cli 7.2.7-0ubuntu0.18.04.1
php7.2-fpm 7.2.7-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
https://usn.ubuntu.com/usn/usn-3702-1
CVE-2018-12882

Package Information:
https://launchpad.net/ubuntu/+source/php7.2/7.2.7-0ubuntu0.18.04.1

–S65DQ4gbfE10HPGza696iNirQ72z8xq9X–

–14VFE4ME9vXOYgTbzdb3HW7T9E9jtyeFc
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAls80kcACgkQZWnYVadE
vpMn4w/8DUZjxD94L5i/EPNBqz9E9FlKXW5MKqkyyksi9r7CdZDOcTKQc8KshmFa
GfmIVdtGGnShbvOkFXVgXOdQWGBdqnQrZt0RYdaQa6YFBTR3io11dGG4SmHMc42a
IVNgfoWodaL47U7o3Pjf0YrWFIAbmqLFHEwnDqTkGhY4sVxQDHRT4U27UEmSxxcr
wdgPbyac4UXevf0059mDGCVWFs5SXpSpItNeCZInGDQlMZWXo6xEBixjVn5sgJqz
8R7SfdKBGDzmzyPpf6YV1V0qd4swj86LNMKctAvpmRr/m/YB+WOB3ZotXwui1G+H
zQvAi1BLszkkw2brpDytv8oCGY62XfArwxMuFaGsbO8J+4qgKIJPyZzpuxv1n01u
5KvYskjoC/14raKIMiKSXZCY9UpXW8sEG7xjVRB0H6ja91PdYs81X2TZTgfDGjzo
pML8b1iEXRFpUiJnPS/FZTyy/64sWr4oT6U8WPyW2LgSSliHbTcaUibJhct/7Trn
FwyMDL+Vx0tJr5iCthuTB81Q42EZxGyQngo3dCAWZiAnfcQ8oUjsJPM96lb0v14c
mfKlH7ADY5WLWbotrjCYl+8o9PDaSIljkykO/oUQ5MtI16GIk1WSHjLkOvxbWjf6
7hk2+9UWCSOQ0LvmXyi78ICBHMYiiL9JOO+Eye2qBT620XdQF8Q=
=Og17
—–END PGP SIGNATURE—–

–14VFE4ME9vXOYgTbzdb3HW7T9E9jtyeFc–

–===============5049150669186592677==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============5049150669186592677==–