[USN-5006-2] PHP vulnerabilities

========================================================================== Ubuntu Security Notice USN-5006-2 July 13, 2021
php5, php7.0 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 ESM – Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in PHP.
Software Description: – php7.0: HTML-embedded scripting language interpreter – php5: HTML-embedded scripting language interpreter
Details:
USN-5006-1 fixed several vulnerabilities in PHP. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that PHP incorrectly handled certain PHAR files. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2020-7068)
It was discovered that PHP incorrectly handled parsing URLs with passwords. A remote attacker could possibly use this issue to cause PHP to mis-parse the URL and produce wrong data. (CVE-2020-7071)
It was discovered that PHP incorrectly handled certain malformed XML data when being parsed by the SOAP extension. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2021-21702)
It was discovered that PHP incorrectly handled the pdo_firebase module. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2021-21704)
It was discovered that PHP incorrectly handled the FILTER_VALIDATE_URL check. A remote attacker could possibly use this issue to perform a server- side request forgery attack. (CVE-2021-21705)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.16+esm1 php7.0-cgi 7.0.33-0ubuntu0.16.04.16+esm1 php7.0-cli 7.0.33-0ubuntu0.16.04.16+esm1 php7.0-fpm 7.0.33-0ubuntu0.16.04.16+esm1
Ubuntu 14.04 ESM: libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm14 php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm14 php5-cli 5.5.9+dfsg-1ubuntu4.29+esm14 php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm14
In general, a standard system update will make all the necessary changes.
References: ubuntu.com/security/notices/USN-5006-2 ubuntu.com/security/notices/USN-5006-1 CVE-2020-7068, CVE-2020-7071, CVE-2021-21702, CVE-2021-21704, CVE-2021-21705