[USN-3766-2] PHP vulnerabilities


–===============7081355697325335579==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-MYmoZdZ8T0TpwYAZiPIA”

–=-MYmoZdZ8T0TpwYAZiPIA
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3766-2
September 19, 2018

php5 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in PHP.

Software Description:
– php5: HTML-embedded scripting language interpreter

Details:

USN-3766-1 fixed a vulnerability in PHP. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0It was discovered that PHP incorrectly handled certain exif tags in
=C2=A0JPEG images. A remote attacker could possibly use this issue to cause
=C2=A0PHP to crash, resulting in a denial of service.=C2=A0
=C2=A0(CVE-2018-14851, CVE-2018-14883)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 libapache2-mod-php5=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A05.3.10-1ubuntu3.32
=C2=A0 php5-cgi=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A05.3.10-1ubuntu3.32
=C2=A0 php5-cli=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A05.3.10-1ubuntu3.32
=C2=A0 php5-fpm=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A05.3.10-1ubuntu3.32

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3766-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3766-1
=C2=A0 CVE-2018-14851, CVE-2018-14883
–=-MYmoZdZ8T0TpwYAZiPIA
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=suJM
—–END PGP SIGNATURE—–

–=-MYmoZdZ8T0TpwYAZiPIA–

–===============7081355697325335579==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============7081355697325335579==–