First published: Mon Oct 28 2019(Updated: )
It was discovered that PHP incorrectly handled certain paths when being used in FastCGI configurations. A remote attacker could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libapache2-mod-php7.3 | <7.3.11-0ubuntu0.19.10.1 | 7.3.11-0ubuntu0.19.10.1 |
=19.10 | ||
All of | ||
ubuntu/php7.3-cgi | <7.3.11-0ubuntu0.19.10.1 | 7.3.11-0ubuntu0.19.10.1 |
=19.10 | ||
All of | ||
ubuntu/php7.3-cli | <7.3.11-0ubuntu0.19.10.1 | 7.3.11-0ubuntu0.19.10.1 |
=19.10 | ||
All of | ||
ubuntu/php7.3-fpm | <7.3.11-0ubuntu0.19.10.1 | 7.3.11-0ubuntu0.19.10.1 |
=19.10 | ||
All of | ||
ubuntu/libapache2-mod-php7.2 | <7.2.24-0ubuntu0.19.04.1 | 7.2.24-0ubuntu0.19.04.1 |
=19.04 | ||
All of | ||
ubuntu/php7.2-cgi | <7.2.24-0ubuntu0.19.04.1 | 7.2.24-0ubuntu0.19.04.1 |
=19.04 | ||
All of | ||
ubuntu/php7.2-cli | <7.2.24-0ubuntu0.19.04.1 | 7.2.24-0ubuntu0.19.04.1 |
=19.04 | ||
All of | ||
ubuntu/php7.2-fpm | <7.2.24-0ubuntu0.19.04.1 | 7.2.24-0ubuntu0.19.04.1 |
=19.04 | ||
All of | ||
ubuntu/libapache2-mod-php7.2 | <7.2.24-0ubuntu0.18.04.1 | 7.2.24-0ubuntu0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/php7.2-cgi | <7.2.24-0ubuntu0.18.04.1 | 7.2.24-0ubuntu0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/php7.2-cli | <7.2.24-0ubuntu0.18.04.1 | 7.2.24-0ubuntu0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/php7.2-fpm | <7.2.24-0ubuntu0.18.04.1 | 7.2.24-0ubuntu0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/libapache2-mod-php7.0 | <7.0.33-0ubuntu0.16.04.7 | 7.0.33-0ubuntu0.16.04.7 |
=16.04 | ||
All of | ||
ubuntu/php7.0-cgi | <7.0.33-0ubuntu0.16.04.7 | 7.0.33-0ubuntu0.16.04.7 |
=16.04 | ||
All of | ||
ubuntu/php7.0-cli | <7.0.33-0ubuntu0.16.04.7 | 7.0.33-0ubuntu0.16.04.7 |
=16.04 | ||
All of | ||
ubuntu/php7.0-fpm | <7.0.33-0ubuntu0.16.04.7 | 7.0.33-0ubuntu0.16.04.7 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4166-1 is a security vulnerability in PHP that allows remote attackers to execute arbitrary code.
The PHP vulnerability affects users who have the affected versions of PHP installed and are using FastCGI configurations.
The severity of USN-4166-1 is high.
To fix the PHP vulnerability, update your PHP installations to version 7.3.11-0ubuntu0.19.10.1 (for Ubuntu 19.10), 7.2.24-0ubuntu0.19.04.1 (for Ubuntu 19.04), 7.2.24-0ubuntu0.18.04.1 (for Ubuntu 18.04), or 7.0.33-0ubuntu0.16.04.7 (for Ubuntu 16.04).
More information about USN-4166-1 can be found on the Ubuntu Security Notices website and the provided references.