Ubuntu Security Notice 4166-2 - USN-4166-1 fixed a vulnerability in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that PHP incorrectly handled certain paths when being used in FastCGI configurations. A remote attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.
22ce5d9536099a62be238f172d1aa7be1a8a0dd24d9ff596e34568e558b800ad
=========================================================================
Ubuntu Security Notice USN-4166-2
October 29, 2019
php5 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
PHP could be made to run programs if it received specially crafted network
traffic.
Software Description:
- php5: HTML-embedded scripting language interpreter
Details:
USN-4166-1 fixed a vulnerability in PHP. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that PHP incorrectly handled certain paths when being
used in FastCGI configurations. A remote attacker could possibly use this
issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.29+esm6
php5-cgi 5.5.9+dfsg-1ubuntu4.29+esm6
php5-cli 5.5.9+dfsg-1ubuntu4.29+esm6
php5-fpm 5.5.9+dfsg-1ubuntu4.29+esm6
Ubuntu 12.04 ESM:
libapache2-mod-php5 5.3.10-1ubuntu3.40
php5-cgi 5.3.10-1ubuntu3.40
php5-cli 5.3.10-1ubuntu3.40
php5-fpm 5.3.10-1ubuntu3.40
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4166-2
https://usn.ubuntu.com/4166-1
CVE-2019-11043