You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa PHP

Sigurnosni nedostaci programskog paketa PHP

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4330-1
April 15, 2020

php5, php7.0, php7.2, php7.3 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in PHP.

Software Description:
– php7.3: server-side, HTML-embedded scripting language (metapackage)
– php7.2: HTML-embedded scripting language interpreter
– php7.0: HTML-embedded scripting language interpreter
– php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled certain file uploads.
An attacker could possibly use this issue to cause a crash.
(CVE-2020-7062)

It was discovered that PHP incorrectly handled certain PHAR archive files.
An attacker could possibly use this issue to access sensitive information.
(CVE-2020-7063)

It was discovered that PHP incorrectly handled certain EXIF files.
An attacker could possibly use this issue to access sensitive information
or cause a crash. (CVE-2020-7064)

It was discovered that PHP incorrectly handled certain UTF strings.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. This issue only affected Ubuntu 19.10. (CVE-2020-7065)

It was discovered that PHP incorrectly handled certain URLs.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10.
(CVE-2020-7066)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
libapache2-mod-php7.3 7.3.11-0ubuntu0.19.10.4
php7.3-cgi 7.3.11-0ubuntu0.19.10.4
php7.3-cli 7.3.11-0ubuntu0.19.10.4
php7.3-fpm 7.3.11-0ubuntu0.19.10.4
php7.3-mbstring 7.3.11-0ubuntu0.19.10.4

Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.4
php7.2 7.2.24-0ubuntu0.18.04.4
php7.2-cgi 7.2.24-0ubuntu0.18.04.4
php7.2-cli 7.2.24-0ubuntu0.18.04.4
php7.2-fpm 7.2.24-0ubuntu0.18.04.4

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.14
php7.0-cgi 7.0.33-0ubuntu0.16.04.14
php7.0-cli 7.0.33-0ubuntu0.16.04.14
php7.0-fpm 7.0.33-0ubuntu0.16.04.14

Ubuntu 14.04 ESM:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm11
php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm11
php5-cli 5.5.9+dfsg-1ubuntu4.29+esm11
php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm11

Ubuntu 12.04 ESM:
libapache2-mod-php5 5.3.10-1ubuntu3.45
php5-cgi 5.3.10-1ubuntu3.45
php5-cli 5.3.10-1ubuntu3.45
php5-fpm 5.3.10-1ubuntu3.45

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4330-1
CVE-2020-7062, CVE-2020-7063, CVE-2020-7064, CVE-2020-7065,
CVE-2020-7066

Package Information:
https://launchpad.net/ubuntu/+source/php7.3/7.3.11-0ubuntu0.19.10.4
https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.18.04.4
https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.14
—–BEGIN PGP SIGNATURE—–
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=t5RA
—–END PGP SIGNATURE—–

AutorJosip Papratovic
Cert idNCERT-REF-2020-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa chromium

Otkriveni su sigurnosni nedostaci u programskom paketu chromium za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close