Yeah, I mean, it would be good if there was an actual CVE attached to
the exploit, as just saying "the most severe of which could allow an
attacker to execute arbitrary code" without specifying which of the
bugfixes they are referring to is sort of neither here nor there.
Looking cursorily at the changes in 7.2.11, none are obviously security
fixes (segfault prevention is good, of course) in the vein of arbitrary
code execution, but I'm also not a security expert!

We will normally do MRE (microrelease updates) of PHP (esp. in the LTS
series) at a regular cadence. AFAICT, this update only came out a week
ago and wasn't embargoed, etc. (so I'm really not sure it's a pressing
security issue, the ISAC notwithstanding).

I will try and work with the security team, but I expect this to just
roll out via normal -updates otherwise.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1798625

Title:
  Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code
  Execution

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.2/+bug/1798625/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to