Public bug reported:

It appears that the php7.2 package(s) for Ubuntu 18.04 (LTS) is/are
stuck at 7.2.10. US-CERT sent out a warning about the vulnerabilities in
this version:

https://www.us-cert.gov/ncas/current-activity/2018/10/12/MS-ISAC-
Releases-Advisory-PHP-Vulnerabilities

and here is what us-cert points you to:

https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-php-
could-allow-for-arbitrary-code-execution_2018-113/


It seems pretty serious. Here is an excerpt:


***
TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in PHP, the most severe of which 
could allow an attacker to execute arbitrary code. Details of these 
vulnerabilities are as below:

Version 7.2.11

Bug #76796 (Compile-time evaluation of disabled function in opcache causes 
segfault).
Bug #76800 (foreach inconsistent if array modified during loop).
Version 7.2.11 & Version 7.1.23

Bug #66828 (iconv_mime_encode Q-encoding longer than it should be).
Bug #73457 (Wrong error message when fopen FTP wrapped fails to open data 
connection).
Bug #74454 (Wrong exception being thrown when using ReflectionMethod).
Bug #74764 (Bindto IPv6 works with file_get_contents but fails with 
stream_socket_client).
Bug #75273 (php_zlib_inflate_filter() may not update bytes_consumed).
Bug #75533 (array_reduce is slow when $carry is large array).
Bug #75696 (posix_getgrnam fails to print details of group).
Bug #76480 (Use curl_multi_wait() so that timeouts are respected).
Bug #76832 (ZendOPcache.MemoryBase periodically deleted by the OS).
Bug #76846 (Segfault in shutdown function after memory limit error).
Bug #76901 (method_exists on SPL iterator passthrough method corrupts memory).
Successfully exploiting the most severe of these vulnerabilities could allow 
for arbitrary code execution in the context of the affected application. 
Depending on the privileges associated with the application, an attacker could 
install programs; view, change, or delete data; or create new accounts with 
full user rights. Failed exploitation could result in a denial-of-service 
condition.
***


lsb_release -rd:

Description:    Ubuntu 18.04.1 LTS
Release:        18.04

apt-cache policy php7.2:

php7.2:
  Installed: 7.2.10-0ubuntu0.18.04.1
  Candidate: 7.2.10-0ubuntu0.18.04.1
  Version table:
 *** 7.2.10-0ubuntu0.18.04.1 500
        500 http://us-central1.gce.archive.ubuntu.com/ubuntu 
bionic-updates/main amd64 Packages
        500 http://security.ubuntu.com/ubuntu bionic-security/main amd64 
Packages
        100 /var/lib/dpkg/status
     7.2.3-1ubuntu1 500
        500 http://us-central1.gce.archive.ubuntu.com/ubuntu bionic/main amd64 
Packages

** Affects: php7.2 (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798625

Title:
  Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code
  Execution

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.2/+bug/1798625/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to