DSA-4552-1 php7.0 -- security update

Related Vulnerabilities: CVE-2019-11043  

Emil Lerner and Andrew Danau discovered that insufficient validation in the path handling code of PHP FPM could result in the execution of arbitrary code in some setups. For the oldstable distribution (stretch), this problem has been fixed in version 7.0.33-0+deb9u6. We recommend that you upgrade your php7.0 packages. For the detailed security status of php7.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php7.0

Debian Security Advisory

DSA-4552-1 php7.0 -- security update

Date Reported:
28 Oct 2019
Affected Packages:
php7.0
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2019-11043.
More information:

Emil Lerner and Andrew Danau discovered that insufficient validation in the path handling code of PHP FPM could result in the execution of arbitrary code in some setups.

For the oldstable distribution (stretch), this problem has been fixed in version 7.0.33-0+deb9u6.

We recommend that you upgrade your php7.0 packages.

For the detailed security status of php7.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php7.0