Ubuntu alert USN-5479-2 (php7.0)
From: | Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-5479-2] PHP vulnerabilities | |
Date: | Mon, 04 Jul 2022 12:13:09 -0300 | |
Message-ID: | <7c6abf98-550a-af9d-fac8-0bd830b28b92@canonical.com> |
========================================================================== Ubuntu Security Notice USN-5479-2 July 04, 2022 php7.0 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Several security issues were fixed in PHP. Software Description: - php7.0: HTML-embedded scripting language interpreter Details: USN-5479-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 16.04 ESM. Original advisory details: Charles Fol discovered that PHP incorrectly handled initializing certain arrays when handling the pg_query_params function. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-31625) Charles Fol discovered that PHP incorrectly handled passwords in mysqlnd. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-31626) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-cgi 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-cli 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-fpm 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-mysql 7.0.33-0ubuntu0.16.04.16+esm4 php7.0-pgsql 7.0.33-0ubuntu0.16.04.16+esm4 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5479-2 https://ubuntu.com/security/notices/USN-5479-1 CVE-2022-31625, CVE-2022-31626