[USN-5479-2] PHP vulnerabilities


========================================================================== Ubuntu Security Notice USN-5479-2 July 04, 2022
php7.0 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 ESM
Summary:
Several security issues were fixed in PHP.
Software Description: – php7.0: HTML-embedded scripting language interpreter
Details:
USN-5479-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 16.04 ESM.
Original advisory details:
Charles Fol discovered that PHP incorrectly handled initializing certain arrays when handling the pg_query_params function. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-31625) Charles Fol discovered that PHP incorrectly handled passwords in mysqlnd. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-31626)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-cgi 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-cli 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-fpm 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-mysql 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-pgsql 7.0.33-0ubuntu0.16.04.16+esm4
In general, a standard system update will make all the necessary changes.
References: ubuntu.com/security/notices/USN-5479-2 ubuntu.com/security/notices/USN-5479-1 CVE-2022-31625, CVE-2022-31626