You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa php

Sigurnosni nedostaci programskog paketa php

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3646-1
May 14, 2018

php5, php7.0, php7.1, php7.2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
– php7.2: HTML-embedded scripting language interpreter
– php7.1: HTML-embedded scripting language interpreter
– php7.0: HTML-embedded scripting language interpreter
– php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled opcache access controls
when configured to use PHP-FPM. A local user could possibly use this issue
to obtain sensitive information from another user’s PHP applications.
(CVE-2018-10545)

It was discovered that the PHP iconv stream filter incorrect handled
certain invalid multibyte sequences. A remote attacker could possibly use
this issue to cause PHP to hang, resulting in a denial of service.
(CVE-2018-10546)

It was discovered that the PHP PHAR error pages incorrectly filtered
certain data. A remote attacker could possibly use this issue to perform
a reflected XSS attack. (CVE-2018-10547)

It was discovered that PHP incorrectly handled LDAP. A malicious remote
LDAP server could possibly use this issue to cause PHP to crash, resulting
in a denial of service. (CVE-2018-10548)

It was discovered that PHP incorrectly handled certain exif tags in JPEG
images. A remote attacker could possibly use this issue to cause PHP to
crash, resulting in a denial of service. This issue only affected Ubuntu
16.04 LTS, Ubuntu 17.10, and Ubuntu 18.04 LTS. (CVE-2018-10549)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.5-0ubuntu0.18.04.1
php7.2-cgi 7.2.5-0ubuntu0.18.04.1
php7.2-cli 7.2.5-0ubuntu0.18.04.1
php7.2-fpm 7.2.5-0ubuntu0.18.04.1

Ubuntu 17.10:
libapache2-mod-php7.1 7.1.17-0ubuntu0.17.10.1
php7.1-cgi 7.1.17-0ubuntu0.17.10.1
php7.1-cli 7.1.17-0ubuntu0.17.10.1
php7.1-fpm 7.1.17-0ubuntu0.17.10.1

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.30-0ubuntu0.16.04.1
php7.0-cgi 7.0.30-0ubuntu0.16.04.1
php7.0-cli 7.0.30-0ubuntu0.16.04.1
php7.0-fpm 7.0.30-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.25
php5-cgi 5.5.9+dfsg-1ubuntu4.25
php5-cli 5.5.9+dfsg-1ubuntu4.25
php5-fpm 5.5.9+dfsg-1ubuntu4.25

In Ubuntu 16.04 LTS, Ubuntu 17.10, and Ubuntu 18.04 LTS, this update uses a
new upstream release, which includes additional bug fixes.

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3646-1
CVE-2018-10545, CVE-2018-10546, CVE-2018-10547, CVE-2018-10548,
CVE-2018-10549

Package Information:
https://launchpad.net/ubuntu/+source/php7.2/7.2.5-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/php7.1/7.1.17-0ubuntu0.17.10.1
https://launchpad.net/ubuntu/+source/php7.0/7.0.30-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.25

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlr5rEoACgkQZWnYVadE
vpOucxAAtVpQy76WcsiG7aSEBx7YOwcYyG2PbMCnaixB+qwmacASq9M3i+EbCmdO
oaFqGncA7+T3B0vk8knf1/IifAXrvz+cRsals4eUQIkcM8TM7xmFPslYAFwsN197
g4xzULaJtKaEZ/qt5rSBCKEua+ETucbiXUemixYpymuJEDU9bxYFnvfvyds4XuKT
4x/jcCfxmKsThZFKT0OP4RUULDDN+rL7FkyOwLR4GJSgvp/X6dRYwdkEBkEJDwvd
VKkR3xB01P9ULzvaLnXVqnAqcdIOZn5vGH8kqqIfjNUIPTx0Fc0+ZP6h1qSuQtya
Ybzsc/kryVLNYsOf/OcBmzWk1A7478PPDaoQXQMGSXFlyvkgDzKDW4D9ElLvcP74
fEyPnZNMKAS459bVt3LEdTeJEJxF0kkagKXnzzr9NRJ/m/otbOGYq2djRwfaGbYL
xBw9hJImDdeqmDMjbGf4QyjW1NPklo94q1dIBSYDMk+GrwU3QHLk2NqPesO4yEly
+Gw3mHI1+UOnUHhJ6E9SnLDb89Cra+Pm9+bUFFRgJhhIl1P/2e8+XsJKdvNmR/mh
xed5Z68trIUNYBle3e5+cKBtWFvmVTMQVqRTbbZ2+idDt5zQcB5+EOqJZ+gH+n5S
CjX6KgNlcET/utrpJv+et/2HZaXfXeJJIGfqsZSQd0iYqOV4pjs=
=/JRf
—–END PGP SIGNATURE—–

AutorPetar Bertok
Cert idNCERT-REF-2018-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa pam-kwallet

Otkriven je sigurnosni nedostatak u programskom paketu pam-kwallet za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje stjecanje viših privilegija...

Close