========================================================================== Ubuntu Security Notice USN-4166-1 October 28, 2019 php7.0, php7.2, php7.3 vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.10 - Ubuntu 19.04 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: PHP could be made to run programs if it received specially crafted network traffic. Software Description: - php7.3: HTML-embedded scripting language interpreter - php7.2: HTML-embedded scripting language interpreter - php7.0: HTML-embedded scripting language interpreter Details: It was discovered that PHP incorrectly handled certain paths when being used in FastCGI configurations. A remote attacker could possibly use this issue to execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10: libapache2-mod-php7.3 7.3.11-0ubuntu0.19.10.1 php7.3-cgi 7.3.11-0ubuntu0.19.10.1 php7.3-cli 7.3.11-0ubuntu0.19.10.1 php7.3-fpm 7.3.11-0ubuntu0.19.10.1 Ubuntu 19.04: libapache2-mod-php7.2 7.2.24-0ubuntu0.19.04.1 php7.2-cgi 7.2.24-0ubuntu0.19.04.1 php7.2-cli 7.2.24-0ubuntu0.19.04.1 php7.2-fpm 7.2.24-0ubuntu0.19.04.1 Ubuntu 18.04 LTS: libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.1 php7.2-cgi 7.2.24-0ubuntu0.18.04.1 php7.2-cli 7.2.24-0ubuntu0.18.04.1 php7.2-fpm 7.2.24-0ubuntu0.18.04.1 Ubuntu 16.04 LTS: libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.7 php7.0-cgi 7.0.33-0ubuntu0.16.04.7 php7.0-cli 7.0.33-0ubuntu0.16.04.7 php7.0-fpm 7.0.33-0ubuntu0.16.04.7 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4166-1 CVE-2019-11043 Package Information: https://launchpad.net/ubuntu/+source/php7.3/7.3.11-0ubuntu0.19.10.1 https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.19.04.1 https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.7