Mehrere Probleme in PHP (Aktualisierung)
ID: | USN-4279-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 16.04 LTS |
Datum: | Mi, 19. Februar 2020, 22:37 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9253 |
Applikationen: | PHP |
Update von: | Mehrere Probleme in PHP |
Originalnachricht |
|
--===============3823316167077128010== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="UlVJffcvxoiEqYs2" Content-Disposition: inline --UlVJffcvxoiEqYs2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inlin Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-4279-2 February 19, 2020 php7.0 regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS Summary: USN-4279-1 introduced a regression in PHP. Software Description: - php7.0: HTML-embedded scripting language interpreter Details: USN-4279-1 fixed vulnerabilities in PHP. The updated packages caused a regression. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that PHP incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. (CVE-2015-9253) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. (CVE-2020-7059) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10. (CVE-2020-7060) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.12 php7.0-cgi 7.0.33-0ubuntu0.16.04.12 php7.0-cli 7.0.33-0ubuntu0.16.04.12 php7.0-fpm 7.0.33-0ubuntu0.16.04.12 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4279-2 https://usn.ubuntu.com/4279-1 CVE-2015-9253 Package Information: https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.12 --UlVJffcvxoiEqYs2 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEf+ebRFcoyOoAQoOeRbznW4QLH2kFAl5NgrsACgkQRbznW4QL H2mfHg//RW2zof5BcnXMjaZSPYoCm/eUjdyXwPEvYMM755wHHpW5RVzdirS0CEp0 CSBn+pm+ruPrpypS9NJwrJpZfoXtxg05ZpmIlGTd7PJsEOq1tv4idaOEEALQCUaF 2Iz9zTKekzrHgD5c8nzR7xCkifCCaIzzn9KKKInhI/BrVN2QBBkYiKCKGgvBUsqp phHWJj6t+uVkq/sHIJP5YVIQ0UHeBbCZj3L8T+L/w/G/+zgsouYZiJ6b3MCa+I2d QfAorEOGJVgtFxVojP8W2c65h3KddY5HUG3SD4CqXJn5ZYp9XwnjFmO/vlbOoWSI tHlI4XvQJccFLmNFngJrRjhf+X3hFwv6OQ2ZiJjbJonC0V4l8s1DOk0dodvShyHZ 2PcrszmlOTPc7FKzyoaKFLaB8Bc9F29AgZ6emiF2XbZofOKAslnfOoG8qNEFxHie 9yK5OVyY+RtfQwXNGD3+PtMkHH2nBUYIu1Lixw8bKnA00GswLW9h4v+8zn84nX6E DcIePZ83ZLWqHvOgn9Q8JV+xtzJxvI66LG0mJnsHCmxmAItRG40POdw3UdSORWY6 chmFBUUMXWm7g1/15slmUz6qu1vkto29XcL+brwHjJLexUUyXoW1dogYFXdlKsfj vy1r6aN3Ybz9BY1wCa0gJmTeG2DRgCNeHTl70a8ZamLa5iqO0m4= =pCc1 -----END PGP SIGNATURE----- --UlVJffcvxoiEqYs2-- --===============3823316167077128010== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============3823316167077128010==-- |