[USN-3902-2] PHP vulnerabilities

protocol=”application/pgp-signature”; boundary=”=-hzww/zjFzFgXj8VtGlwl”

–=-hzww/zjFzFgXj8VtGlwl

Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3902-2
March 12, 2019

php5 vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in PHP.

Software Description:
– php5: HTML-embedded scripting language interpreter

Details:

USN-3902-1 fixed a vulnerability in PHP. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0It was discovered that the PHP XML-RPC module incorrectly handled
=C2=A0decoding XML data. A remote attacker could possibly use this issue to
=C2=A0cause PHP to crash, resulting in a denial of service. (CVE-2019-9020,
=C2=A0CVE-2019-9024)

=C2=A0It was discovered that the PHP PHAR module incorrectly handled certai=
n
=C2=A0filenames. A remote attacker could possibly use this issue to cause
=C2=A0PHP to crash, resulting in a denial of service. (CVE-2019-9021)

=C2=A0It was discovered that PHP incorrectly handled mbstring regular
=C2=A0expressions. A remote attacker could possibly use this issue to cause
=C2=A0PHP to crash, resulting in a denial of service. (CVE-2019-9023)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 libapache2-mod-php5=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A05.3.10-1ubuntu3.33
=C2=A0 php5-cgi=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A05.3.10-1ubuntu3.33
=C2=A0 php5-cli=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A05.3.10-1ubuntu3.33
=C2=A0 php5-fpm=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A05.3.10-1ubuntu3.33
=C2=A0 php5-xmlrpc=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A05.3.10=
-1ubuntu3.33

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3902-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3902-1
=C2=A0 CVE-2019-9020, CVE-2019-9021, CVE-2019-9023, CVE-2019-9024
–=-hzww/zjFzFgXj8VtGlwl

Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAABCAAGBQJciApRAAoJEEW851uECx9p+Z8P/i3xz9p/xi8LYjn6BKjixMqx
dQ4az9FzrpHWAkfm0PM1hGoKcnRLMiA9PbacXP61vFThaiGF+V+9dg1mdzDree7u
ObLihyGhn1XEdi+CtTcGcdj+LARQJ+uSUp118zLMwy8AniPaLMxiy/lkm+m9dX+Q
EgVTDyuVZtT6WFj0M5tYlDf7YKym7ceu9Yt7GiFcyJUiLblqDj15SN+OEND8aCh3
NRHR5uOqBOVRAJ9dUrN2uWtdH88kN3UGc4ZdaN4ruL91erWXvqhkuUF6B6Kh8AHj
/XqMWOmx6/E6RJqYbAiNamelL7EkJiKlVkNa0g02c6XDH4JPbvtG9dFx76e4y+TM
JskXFxPbhIXS6KqmuXSZ5xTUwfcu1st1I+MfJJO5O0jNTHUl4NsEyDnXaBruOx2N
YZlRKVkDjhwDRFNfpXnWyNJvMck/KeNFZF6FTuP/C4dUBYZ18nY6+3UoziT311Tp
NfHAPIOsBVxFqJkhbPQ8uNjc4KSeYhuzJhk7tdinCywlovWPRxeaUoikLestPcJQ
+/L0iyXZD0NPLpEusKc7h1xk7lVIDJQtdDItba+fpv+SGL0kDa+Yd70s/JrsHsIo
IjgHABleTaW7xjZSzKXq/GOZVMjs1+V1UoFaBPD3dFt1u//0xjyGelvMTuaRtqet
rOUbQBa/OLG/J1SRqqd3
=yROV
—–END PGP SIGNATURE—–

–=-hzww/zjFzFgXj8VtGlwl–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK