==========================================================================
Ubuntu Security Notice USN-4166-2
October 29, 2019
php5 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
PHP could be made to run programs if it received specially crafted network
traffic.
Software Description:
– php5: HTML-embedded scripting language interpreter
Details:
USN-4166-1 fixed a vulnerability in PHP. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that PHP incorrectly handled certain paths when being
used in FastCGI configurations. A remote attacker could possibly use this
issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm6
php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm6
php5-cli 5.5.9+dfsg-1ubuntu4.29+esm6
php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm6
Ubuntu 12.04 ESM:
libapache2-mod-php5 5.3.10-1ubuntu3.40
php5-cgi 5.3.10-1ubuntu3.40
php5-cli 5.3.10-1ubuntu3.40
php5-fpm 5.3.10-1ubuntu3.40
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4166-2
https://usn.ubuntu.com/4166-1
CVE-2019-11043
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=Jqg8
—–END PGP SIGNATURE—–
—