=========================================================================Ubuntu Security Notice USN-4097-1
August 13, 2019

php7.0, php7.2 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

PHP could be made to crash or execute arbitrary code if it
received specially crafted image.

Software Description:
- php7.2: HTML-embedded scripting language interpreter
- php7.0: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled certain images.
An attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2019-11041, CVE-2019-11042)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
  libapache2-mod-php7.2           7.2.19-0ubuntu0.19.04.2
  php7.2-cgi                      7.2.19-0ubuntu0.19.04.2
  php7.2-cli                      7.2.19-0ubuntu0.19.04.2
  php7.2-fpm                      7.2.19-0ubuntu0.19.04.2
  php7.2-xmlrpc                   7.2.19-0ubuntu0.19.04.2

Ubuntu 18.04 LTS:
  libapache2-mod-php7.2           7.2.19-0ubuntu0.18.04.2
  php7.2-cgi                      7.2.19-0ubuntu0.18.04.2
  php7.2-cli                      7.2.19-0ubuntu0.18.04.2
  php7.2-fpm                      7.2.19-0ubuntu0.18.04.2
  php7.2-xmlrpc                   7.2.19-0ubuntu0.18.04.2

Ubuntu 16.04 LTS:
  libapache2-mod-php7.0           7.0.33-0ubuntu0.16.04.6
  php7.0-cgi                      7.0.33-0ubuntu0.16.04.6
  php7.0-cli                      7.0.33-0ubuntu0.16.04.6
  php7.0-fpm                      7.0.33-0ubuntu0.16.04.6
  php7.0-xmlrpc                   7.0.33-0ubuntu0.16.04.6

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-4097-1
  CVE-2019-11041, CVE-2019-11042

Package Information:
  https://launchpad.net/ubuntu/+source/php7.2/7.2.19-0ubuntu0.19.04.2
  https://launchpad.net/ubuntu/+source/php7.2/7.2.19-0ubuntu0.18.04.2
  https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.6

Ubuntu 4097-1: PHP vulnerabilities

August 13, 2019
PHP could be made to crash or execute arbitrary code if it received specially crafted image.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04: libapache2-mod-php7.2 7.2.19-0ubuntu0.19.04.2 php7.2-cgi 7.2.19-0ubuntu0.19.04.2 php7.2-cli 7.2.19-0ubuntu0.19.04.2 php7.2-fpm 7.2.19-0ubuntu0.19.04.2 php7.2-xmlrpc 7.2.19-0ubuntu0.19.04.2 Ubuntu 18.04 LTS: libapache2-mod-php7.2 7.2.19-0ubuntu0.18.04.2 php7.2-cgi 7.2.19-0ubuntu0.18.04.2 php7.2-cli 7.2.19-0ubuntu0.18.04.2 php7.2-fpm 7.2.19-0ubuntu0.18.04.2 php7.2-xmlrpc 7.2.19-0ubuntu0.18.04.2 Ubuntu 16.04 LTS: libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.6 php7.0-cgi 7.0.33-0ubuntu0.16.04.6 php7.0-cli 7.0.33-0ubuntu0.16.04.6 php7.0-fpm 7.0.33-0ubuntu0.16.04.6 php7.0-xmlrpc 7.0.33-0ubuntu0.16.04.6 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-4097-1

CVE-2019-11041, CVE-2019-11042

Severity
August 13, 2019

Package Information

https://launchpad.net/ubuntu/+source/php7.2/7.2.19-0ubuntu0.19.04.2 https://launchpad.net/ubuntu/+source/php7.2/7.2.19-0ubuntu0.18.04.2 https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.6

Related News