Ubuntu Security Notice 5717-1 - It was discovered that PHP incorrectly handled certain gzip files. An attacker could possibly use this issue to cause a denial of service. It was discovered that PHP incorrectly handled certain cookies. An attacker could possibly use this issue to compromise the data It was discovered that PHP incorrectly handled certain image fonts. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.
5d9c5fa429c56df30e64215e02fbcce857d17b47d4d6b19014cc6d97a3a22070
=========================================================================
Ubuntu Security Notice USN-5717-1
November 08, 2022
php7.2, php7.4, php8.1 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in PHP.
Software Description:
- php8.1: HTML-embedded scripting language interpreter
- php7.4: HTML-embedded scripting language interpreter
- php7.2: HTML-embedded scripting language interpreter
Details:
It was discovered that PHP incorrectly handled certain gzip files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-31628)
It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to compromise the data
(CVE-2022-31629)
It was discovered that PHP incorrectly handled certain image fonts.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.
(CVE-2022-31630)
Nicky Mouha discovered that PHP incorrectly handled certain SHA-3 operations.
An attacker could possibly use this issue to cause a crash
or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.10, and Ubuntu 22.04 LTS. (CVE-2022-37454)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.10:
libapache2-mod-php7.4 8.1.7-1ubuntu3.1
libapache2-mod-php8.0 8.1.7-1ubuntu3.1
libapache2-mod-php8.1 8.1.7-1ubuntu3.1
php8.1 8.1.7-1ubuntu3.1
php8.1-cgi 8.1.7-1ubuntu3.1
php8.1-cli 8.1.7-1ubuntu3.1
php8.1-zip 8.1.7-1ubuntu3.1
Ubuntu 22.04 LTS:
libapache2-mod-php7.4 8.1.2-1ubuntu2.8
libapache2-mod-php8.0 8.1.2-1ubuntu2.8
libapache2-mod-php8.1 8.1.2-1ubuntu2.8
php8.1 8.1.2-1ubuntu2.8
php8.1-cgi 8.1.2-1ubuntu2.8
php8.1-cli 8.1.2-1ubuntu2.8
php8.1-zip 8.1.2-1ubuntu2.8
Ubuntu 20.04 LTS:
libapache2-mod-php7.4 7.4.3-4ubuntu2.15
php7.4 7.4.3-4ubuntu2.15
php7.4-cgi 7.4.3-4ubuntu2.15
php7.4-cli 7.4.3-4ubuntu2.15
php7.4-zip 7.4.3-4ubuntu2.15
Ubuntu 18.04 LTS:
libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.15
php7.2 7.2.24-0ubuntu0.18.04.15
php7.2-cgi 7.2.24-0ubuntu0.18.04.15
php7.2-cli 7.2.24-0ubuntu0.18.04.15
php7.2-zip 7.2.24-0ubuntu0.18.04.15
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5717-1
CVE-2022-31628, CVE-2022-31629, CVE-2022-31630, CVE-2022-37454
Package Information:
https://launchpad.net/ubuntu/+source/php8.1/8.1.7-1ubuntu3.1
https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.8
https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.15
https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.18.04.15