USN-3702-1: PHP vulnerability
4 July 2018
PHP could be made to crash or run programs if it opened a specially crafted file.
Releases
Packages
- php7.2 - HTML-embedded scripting language interpreter
Details
It was discovered that PHP incorrectly handled exif tags in certain images.
A remote attacker could use this issue to cause PHP to crash, resulting in
a denial of service, or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libapache2-mod-php7.2
-
7.2.7-0ubuntu0.18.04.1
-
php7.2-cgi
-
7.2.7-0ubuntu0.18.04.1
-
php7.2-cli
-
7.2.7-0ubuntu0.18.04.1
-
php7.2-fpm
-
7.2.7-0ubuntu0.18.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References
Related notices
- USN-3702-2: php7.2-imap, php7.2-pgsql, php7.2-zip, php7.2-bcmath, php7.2-opcache, php7.2-mysql, php7.2-recode, php7.2-sqlite3, php7.2-ldap, php7.2-intl, php7.2-tidy, libphp7.2-embed, php7.2-json, php7.2-dba, php7.2-phpdbg, php7.2-soap, php7.2, php7.2-curl, php7.2-interbase, php7.2-sybase, php7.2-cli, php7.2-xsl, libapache2-mod-php7.2, php7.2-mbstring, php7.2-cgi, php7.2-odbc, php7.2-xmlrpc, php7.2-fpm, php7.2-bz2, php7.2-dev, php7.2-enchant, php7.2-readline, php7.2-snmp, php7.2-common, php7.2-gd, php7.2-gmp, php7.2-pspell, php7.2-xml