[USN-3766-1] PHP vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============2841059390029862769==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”xMnhWvi99UMwVpSIOBcciCl3NJjEyYwVd”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–xMnhWvi99UMwVpSIOBcciCl3NJjEyYwVd
Content-Type: multipart/mixed; boundary=”9qSCOuZwrTGRamaTDpuAi3uvsJVXYfhfU”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: “ubuntu-security-announce@lists.ubuntu.com”

Message-ID:
Subject: [USN-3766-1] PHP vulnerabilities

–9qSCOuZwrTGRamaTDpuAi3uvsJVXYfhfU
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3766-1
September 18, 2018

php5, php7.0, php7.2 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
– php7.2: HTML-embedded scripting language interpreter
– php7.0: HTML-embedded scripting language interpreter
– php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled restarting certain child
processes when php-fpm is used. A remote attacker could possibly use this=

issue to cause a denial of service. This issue was only addressed in Ubun=
tu
18.04 LTS. (CVE-2015-9253)

It was discovered that PHP incorrectly handled certain exif tags in JPEG
images. A remote attacker could possibly use this issue to cause PHP to
crash, resulting in a denial of service. (CVE-2018-14851, CVE-2018-14883)=

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.10-0ubuntu0.18.04.1
php7.2-cgi 7.2.10-0ubuntu0.18.04.1
php7.2-cli 7.2.10-0ubuntu0.18.04.1
php7.2-fpm 7.2.10-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.32-0ubuntu0.16.04.1
php7.0-cgi 7.0.32-0ubuntu0.16.04.1
php7.0-cli 7.0.32-0ubuntu0.16.04.1
php7.0-fpm 7.0.32-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.26
php5-cgi 5.5.9+dfsg-1ubuntu4.26
php5-cli 5.5.9+dfsg-1ubuntu4.26
php5-fpm 5.5.9+dfsg-1ubuntu4.26

In Ubuntu 16.04 LTS and Ubuntu 18.04 LTS, this update uses a new upstream=

release, which includes additional bug fixes.

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3766-1
CVE-2015-9253, CVE-2018-14851, CVE-2018-14883

Package Information:
https://launchpad.net/ubuntu/+source/php7.2/7.2.10-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/php7.0/7.0.32-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.26

–9qSCOuZwrTGRamaTDpuAi3uvsJVXYfhfU–

–xMnhWvi99UMwVpSIOBcciCl3NJjEyYwVd
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=TPiG
—–END PGP SIGNATURE—–

–xMnhWvi99UMwVpSIOBcciCl3NJjEyYwVd–

–===============2841059390029862769==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============2841059390029862769==–