This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6102096021934257152== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="Tr9Qmfu1l9aal0gtDDtjE6u5KTLv4MPL6"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --Tr9Qmfu1l9aal0gtDDtjE6u5KTLv4MPL6 Content-Type: multipart/mixed; boundary="BCJ2qpo85f5ah0FCxb9lfKFLvAiWSeDK7"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <1cab3568-3a07-0ef2-f9b6-e54feb4df893@canonical.com> Subject: [USN-3382-1] PHP vulnerabilities
--BCJ2qpo85f5ah0FCxb9lfKFLvAiWSeDK7 Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3382-1 August 10, 2017
php5, php7.0 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in PHP.
Software Description: - php7.0: HTML-embedded scripting language interpreter - php5: HTML-embedded scripting language interpreter
Details:
It was discovered that the PHP opcache created keys for files it cached based on their filepath. A local attacker could possibly use this issue in a shared hosting environment to obtain sensitive information. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-8994)
It was discovered that the PHP URL parser incorrectly handled certain URI components. A remote attacker could possibly use this issue to bypass hostname-specific URL checks. This issue only affected Ubuntu 14.04 LTS. (CVE-2016-10397)
It was discovered that PHP incorrectly handled certain boolean parameters when unserializing data. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2017-11143)
Sebastian Li, Wei Lei, Xie Xiaofei, and Liu Yang discovered that PHP incorrectly handled the OpenSSL sealing function. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2017-11144)
Wei Lei and Liu Yang discovered that the PHP date extension incorrectly handled memory. A remote attacker could possibly use this issue to disclose sensitive information from the server. (CVE-2017-11145)
It was discovered that PHP incorrectly handled certain PHAR archives. A remote attacker could use this issue to cause PHP to crash or disclose sensitive information. This issue only affected Ubuntu 14.04 LTS. (CVE-2017-11147)
It was discovered that PHP incorrectly handled locale length. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2017-11362)
Wei Lei and Liu Yang discovered that PHP incorrectly handled parsing ini files. An attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. (CVE-2017-11628)
It was discovered that PHP mbstring incorrectly handled certain regular expressions. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04: libapache2-mod-php7.0 7.0.22-0ubuntu0.17.04.1 php7.0-cgi 7.0.22-0ubuntu0.17.04.1 php7.0-cli 7.0.22-0ubuntu0.17.04.1 php7.0-fpm 7.0.22-0ubuntu0.17.04.1
Ubuntu 16.04 LTS: libapache2-mod-php7.0 7.0.22-0ubuntu0.16.04.1 php7.0-cgi 7.0.22-0ubuntu0.16.04.1 php7.0-cli 7.0.22-0ubuntu0.16.04.1 php7.0-fpm 7.0.22-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.22 php5-cgi 5.5.9+dfsg-1ubuntu4.22 php5-cli 5.5.9+dfsg-1ubuntu4.22 php5-fpm 5.5.9+dfsg-1ubuntu4.22
In Ubuntu 16.04 LTS and Ubuntu 17.04, this update uses a new upstream release, which includes additional bug fixes.
In general, a standard system update will make all the necessary changes.
References: https://www.ubuntu.com/usn/usn-3382-1 CVE-2015-8994, CVE-2016-10397, CVE-2017-11143, CVE-2017-11144, CVE-2017-11145, CVE-2017-11147, CVE-2017-11362, CVE-2017-11628, CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229
Package Information: https://launchpad.net/ubuntu/+source/php7.0/7.0.22-0ubuntu0.17.04.1 https://launchpad.net/ubuntu/+source/php7.0/7.0.22-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.22
--BCJ2qpo85f5ah0FCxb9lfKFLvAiWSeDK7--
--Tr9Qmfu1l9aal0gtDDtjE6u5KTLv4MPL6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJZjH5WAAoJEGVp2FWnRL6TmwwP/0pHbZj88gpLwiUKmTEe5LLU glf80OSa+SMtXq0BYeiB84+FEipHw1zDtVI2UfIWdrlFaFg0GhOKtKJ4BVg7TyWZ +F1LJ/wZw7F4I3AfP4KmKXZU7UJv1yl/AF7ut7Ze8alNofxf9V6djtP3P0ERYgl+ wH7nsal37sNKTZ76Mc8wQQSBEEvTBIx+3kEnNtU2ueJonm1GuY4WbGKurynCdrgd Hpl+L7BGO42g2yWyeTSsDYg15tt/3QLadZJ+RbkyjEwy/heUsszqKI0uwcSCZ3iw dZnBwz025Tlb61EJYFD7upExuPc6gcOniySTT1TVW4DeBja4SvdMLNQi2IjKH3lM 8njwPjWslt2/n5A0oE7bSd6j/354N2OjnRDw4Wbdh9d6eWqSxlFg03XilzMv6XBj psdpfRfYMNl8wkITBYDGXx5L/fSL2Q4pB/wSzzP8xmOmkMtmUkBT8vHsFE+AdWDC TXw5OCIqx81kjCwz/u36GKTk/1iPIwF1bQHxNz9/GPuoqUCIBNCD3mIoT+RaLFaM RPmOsXlhB+Cj+qTjbmvC06bMKJv5C0ziIyG9ZeShoe+t/hjYvPtELWX3y97a+jxF Clrq2zhCPiT+LF/5ubMoxVLuiGL/GY71bZ9rKy2jC+7k+Njy1TdmhH80km6Kq2lJ 0tfOGA6xRMPFyylsXsmJ =lUQx -----END PGP SIGNATURE-----
--Tr9Qmfu1l9aal0gtDDtjE6u5KTLv4MPL6--
--===============6102096021934257152== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============6102096021934257152==--
|