==========================================================================
Ubuntu Security Notice USN-4009-1
June 05, 2019
php7.0, php7.2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in PHP.
Software Description:
– php7.2: HTML-embedded scripting language interpreter
– php7.0: HTML-embedded scripting language interpreter
Details:
It was discovered that PHP incorrectly handled certain exif tags in images.
A remote attacker could use this issue to cause PHP to crash, resulting in
a denial of service, or possibly obtain sensitive information.
(CVE-2019-11036)
It was discovered that PHP incorrectly decoding certain MIME headers. A
remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2019-11039)
It was discovered that PHP incorrectly handled certain exif tags in images.
A remote attacker could use this issue to cause PHP to crash, resulting in
a denial of service, or possibly execute arbitrary code. (CVE-2019-11040)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
libapache2-mod-php7.2 7.2.19-0ubuntu0.19.04.1
php7.2-cgi 7.2.19-0ubuntu0.19.04.1
php7.2-cli 7.2.19-0ubuntu0.19.04.1
php7.2-fpm 7.2.19-0ubuntu0.19.04.1
Ubuntu 18.10:
libapache2-mod-php7.2 7.2.19-0ubuntu0.18.10.1
php7.2-cgi 7.2.19-0ubuntu0.18.10.1
php7.2-cli 7.2.19-0ubuntu0.18.10.1
php7.2-fpm 7.2.19-0ubuntu0.18.10.1
Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.19-0ubuntu0.18.04.1
php7.2-cgi 7.2.19-0ubuntu0.18.04.1
php7.2-cli 7.2.19-0ubuntu0.18.04.1
php7.2-fpm 7.2.19-0ubuntu0.18.04.1
Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.5
php7.0-cgi 7.0.33-0ubuntu0.16.04.5
php7.0-cli 7.0.33-0ubuntu0.16.04.5
php7.0-fpm 7.0.33-0ubuntu0.16.04.5
In Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04, this update uses a new
upstream release, which includes additional bug fixes.
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4009-1
CVE-2019-11036, CVE-2019-11039, CVE-2019-11040
Package Information:
https://launchpad.net/ubuntu/+source/php7.2/7.2.19-0ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/php7.2/7.2.19-0ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/php7.2/7.2.19-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.5
—–BEGIN PGP SIGNATURE—–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=Z6lE
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-4009-2
June 05, 2019
php5 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in PHP.
Software Description:
– php5: HTML-embedded scripting language interpreter
Details:
USN-4009-1 fixed several vulnerabilities in PHP. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that PHP incorrectly decoding certain MIME headers.
A remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2019-11039)
It was discovered that PHP incorrectly handled certain exif tags in
images. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2019-11040)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm3
php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm3
php5-cli 5.5.9+dfsg-1ubuntu4.29+esm3
php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm3
Ubuntu 12.04 ESM:
libapache2-mod-php5 5.3.10-1ubuntu3.37
php5-cgi 5.3.10-1ubuntu3.37
php5-cli 5.3.10-1ubuntu3.37
php5-fpm 5.3.10-1ubuntu3.37
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/4009-2
https://usn.ubuntu.com/4009-1
CVE-2019-11039, CVE-2019-11040—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=05uE
—–END PGP SIGNATURE—–
—