==========================================================================
Ubuntu Security Notice USN-4330-1
April 15, 2020
php5, php7.0, php7.2, php7.3 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 19.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in PHP.
Software Description:
– php7.3: server-side, HTML-embedded scripting language (metapackage)
– php7.2: HTML-embedded scripting language interpreter
– php7.0: HTML-embedded scripting language interpreter
– php5: HTML-embedded scripting language interpreter
Details:
It was discovered that PHP incorrectly handled certain file uploads.
An attacker could possibly use this issue to cause a crash.
(CVE-2020-7062)
It was discovered that PHP incorrectly handled certain PHAR archive files.
An attacker could possibly use this issue to access sensitive information.
(CVE-2020-7063)
It was discovered that PHP incorrectly handled certain EXIF files.
An attacker could possibly use this issue to access sensitive information
or cause a crash. (CVE-2020-7064)
It was discovered that PHP incorrectly handled certain UTF strings.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. This issue only affected Ubuntu 19.10. (CVE-2020-7065)
It was discovered that PHP incorrectly handled certain URLs.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10.
(CVE-2020-7066)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.10:
libapache2-mod-php7.3 7.3.11-0ubuntu0.19.10.4
php7.3-cgi 7.3.11-0ubuntu0.19.10.4
php7.3-cli 7.3.11-0ubuntu0.19.10.4
php7.3-fpm 7.3.11-0ubuntu0.19.10.4
php7.3-mbstring 7.3.11-0ubuntu0.19.10.4
Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.4
php7.2 7.2.24-0ubuntu0.18.04.4
php7.2-cgi 7.2.24-0ubuntu0.18.04.4
php7.2-cli 7.2.24-0ubuntu0.18.04.4
php7.2-fpm 7.2.24-0ubuntu0.18.04.4
Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.14
php7.0-cgi 7.0.33-0ubuntu0.16.04.14
php7.0-cli 7.0.33-0ubuntu0.16.04.14
php7.0-fpm 7.0.33-0ubuntu0.16.04.14
Ubuntu 14.04 ESM:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm11
php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm11
php5-cli 5.5.9+dfsg-1ubuntu4.29+esm11
php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm11
Ubuntu 12.04 ESM:
libapache2-mod-php5 5.3.10-1ubuntu3.45
php5-cgi 5.3.10-1ubuntu3.45
php5-cli 5.3.10-1ubuntu3.45
php5-fpm 5.3.10-1ubuntu3.45
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4330-1
CVE-2020-7062, CVE-2020-7063, CVE-2020-7064, CVE-2020-7065,
CVE-2020-7066
Package Information:
https://launchpad.net/ubuntu/+source/php7.3/7.3.11-0ubuntu0.19.10.4
https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.18.04.4
https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.14
—–BEGIN PGP SIGNATURE—–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=t5RA
—–END PGP SIGNATURE—–
—