USN-4097-1: PHP vulnerabilities
13 August 2019
PHP could be made to crash or execute arbitrary code if it received specially crafted image.
Releases
Packages
Details
It was discovered that PHP incorrectly handled certain images.
An attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2019-11041, CVE-2019-11042)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04
-
libapache2-mod-php7.2
-
7.2.19-0ubuntu0.19.04.2
-
php7.2-cgi
-
7.2.19-0ubuntu0.19.04.2
-
php7.2-cli
-
7.2.19-0ubuntu0.19.04.2
-
php7.2-fpm
-
7.2.19-0ubuntu0.19.04.2
-
php7.2-xmlrpc
-
7.2.19-0ubuntu0.19.04.2
Ubuntu 18.04
-
libapache2-mod-php7.2
-
7.2.19-0ubuntu0.18.04.2
-
php7.2-cgi
-
7.2.19-0ubuntu0.18.04.2
-
php7.2-cli
-
7.2.19-0ubuntu0.18.04.2
-
php7.2-fpm
-
7.2.19-0ubuntu0.18.04.2
-
php7.2-xmlrpc
-
7.2.19-0ubuntu0.18.04.2
Ubuntu 16.04
-
libapache2-mod-php7.0
-
7.0.33-0ubuntu0.16.04.6
-
php7.0-cgi
-
7.0.33-0ubuntu0.16.04.6
-
php7.0-cli
-
7.0.33-0ubuntu0.16.04.6
-
php7.0-fpm
-
7.0.33-0ubuntu0.16.04.6
-
php7.0-xmlrpc
-
7.0.33-0ubuntu0.16.04.6
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4097-2: php5-cgi, libphp5-embed, php5-intl, libapache2-mod-php5, php5-xsl, php5-snmp, php5-mysqlnd, php5-sqlite, php5-recode, php5-odbc, php-pear, php5-pgsql, php5-mysql, php5-cli, php5-pspell, php5-xmlrpc, php5-curl, php5-readline, php5-gmp, php5-enchant, php5, php5-fpm, php5-common, libapache2-mod-php5filter, php5-gd, php5-dev, php5-ldap, php5-tidy, php5-sybase