You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa PHP

Sigurnosni nedostaci programskog paketa PHP

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4239-1
January 15, 2020

php5, php7.0, php7.2, php7.3 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 19.04
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in PHP.

Software Description:
– php7.3: server-side, HTML-embedded scripting language (metapackage)
– php7.2: HTML-embedded scripting language interpreter
– php7.0: HTML-embedded scripting language interpreter
– php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled certain files. An attacker
could possibly use this issue to cause a denial of service. This issue only affected
Ubuntu 14.04 ESM, 16.04 LTS, 18.04 LTS, 19.04 and 19.10. (CVE-2019-11045)

It was discovered that PHP incorrectly handled certain inputs. An attacker
could possibly use this issue to expose sensitive information.
(CVE-2019-11046)

It was discovered that PHP incorrectly handled certain images. An attacker
could possibly use this issue to access sensitive information.
(CVE-2019-11047, CVE-2019-11050)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
libapache2-mod-php7.3 7.3.11-0ubuntu0.19.10.2
php7.3-bcmath 7.3.11-0ubuntu0.19.10.2
php7.3-cgi 7.3.11-0ubuntu0.19.10.2
php7.3-cli 7.3.11-0ubuntu0.19.10.2
php7.3-fpm 7.3.11-0ubuntu0.19.10.2
php7.3-mbstring 7.3.11-0ubuntu0.19.10.2
php7.3-xmlrpc 7.3.11-0ubuntu0.19.10.2

Ubuntu 19.04:
libapache2-mod-php7.2 7.2.24-0ubuntu0.19.04.2
php7.2-bcmath 7.2.24-0ubuntu0.19.04.2
php7.2-cgi 7.2.24-0ubuntu0.19.04.2
php7.2-cli 7.2.24-0ubuntu0.19.04.2
php7.2-fpm 7.2.24-0ubuntu0.19.04.2
php7.2-mbstring 7.2.24-0ubuntu0.19.04.2
php7.2-xmlrpc 7.2.24-0ubuntu0.19.04.2

Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.2
php7.2-bcmath 7.2.24-0ubuntu0.18.04.2
php7.2-cgi 7.2.24-0ubuntu0.18.04.2
php7.2-cli 7.2.24-0ubuntu0.18.04.2
php7.2-fpm 7.2.24-0ubuntu0.18.04.2
php7.2-mbstring 7.2.24-0ubuntu0.18.04.2
php7.2-xmlrpc 7.2.24-0ubuntu0.18.04.2

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.9
php7.0-bcmath 7.0.33-0ubuntu0.16.04.9
php7.0-cgi 7.0.33-0ubuntu0.16.04.9
php7.0-cli 7.0.33-0ubuntu0.16.04.9
php7.0-fpm 7.0.33-0ubuntu0.16.04.9
php7.0-mbstring 7.0.33-0ubuntu0.16.04.9
php7.0-xmlrpc 7.0.33-0ubuntu0.16.04.9

Ubuntu 14.04 ESM:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm8
php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm8
php5-cli 5.5.9+dfsg-1ubuntu4.29+esm8
php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm8
php5-xmlrpc 5.5.9+dfsg-1ubuntu4.29+esm8

Ubuntu 12.04 ESM:
libapache2-mod-php5 5.3.10-1ubuntu3.42
php5-cgi 5.3.10-1ubuntu3.42
php5-cli 5.3.10-1ubuntu3.42
php5-fpm 5.3.10-1ubuntu3.42
php5-xmlrpc 5.3.10-1ubuntu3.42

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4239-1
CVE-2019-11045, CVE-2019-11046, CVE-2019-11047, CVE-2019-11050

Package Information:
https://launchpad.net/ubuntu/+source/php7.3/7.3.11-0ubuntu0.19.10.2
https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.19.04.2
https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.18.04.2
https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.9
—–BEGIN PGP SIGNATURE—–
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=68k3
—–END PGP SIGNATURE—–

AutorToni Vugdelija
Cert idNCERT-REF-2020-01-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa MozillaFirefox

Otkriveni su sigurnosni nedostaci u programskom paketu MozillaFirefox za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izazivanje DoS...

Close