Ubuntu 3953-1: PHP vulnerabilities
Summary
Update Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04: libapache2-mod-php7.2 7.2.17-0ubuntu0.19.04.1 php7.2-cgi 7.2.17-0ubuntu0.19.04.1 php7.2-cli 7.2.17-0ubuntu0.19.04.1 php7.2-fpm 7.2.17-0ubuntu0.19.04.1 Ubuntu 18.10: libapache2-mod-php7.2 7.2.17-0ubuntu0.18.10.1 php7.2-cgi 7.2.17-0ubuntu0.18.10.1 php7.2-cli 7.2.17-0ubuntu0.18.10.1 php7.2-fpm 7.2.17-0ubuntu0.18.10.1 Ubuntu 18.04 LTS: libapache2-mod-php7.2 7.2.17-0ubuntu0.18.04.1 php7.2-cgi 7.2.17-0ubuntu0.18.04.1 php7.2-cli 7.2.17-0ubuntu0.18.04.1 php7.2-fpm 7.2.17-0ubuntu0.18.04.1 Ubuntu 16.04 LTS: libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.4 php7.0-cgi 7.0.33-0ubuntu0.16.04.4 php7.0-cli 7.0.33-0ubuntu0.16.04.4 php7.0-fpm 7.0.33-0ubuntu0.16.04.4 In Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04, this update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes.
References
https://ubuntu.com/security/notices/USN-3953-1
CVE-2019-11034, CVE-2019-11035
Package Information
https://launchpad.net/ubuntu/+source/php7.2/7.2.17-0ubuntu0.19.04.1 https://launchpad.net/ubuntu/+source/php7.2/7.2.17-0ubuntu0.18.10.1 https://launchpad.net/ubuntu/+source/php7.2/7.2.17-0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/php7.0/7.0.33-0ubuntu0.16.04.4