Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201910-01 ] PHP: Arbitrary code execution
Date: Fri, 25 Oct 2019 11:11:10
Message-Id: 077ed0fe-a48d-af3f-c143-f740af85f2c8@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201910-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: PHP: Arbitrary code execution
9 Date: October 25, 2019
10 Bugs: #698452
11 ID: 201910-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in PHP might allow an attacker to execute arbitrary
19 code.
20
21 Background
22 ==========
23
24 PHP is an open source general-purpose scripting language that is
25 especially suited for web development.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-lang/php < 7.1.33 >= 7.1.33
34 < 7.2.24 >= 7.2.24
35 < 7.3.11 >= 7.3.11
36
37 Description
38 ===========
39
40 A underflow in env_path_info in PHP-FPM under certain configurations
41 can be exploited to gain remote code execution.
42
43 Impact
44 ======
45
46 A remote attacker, by sending special crafted HTTP requests, could
47 possibly execute arbitrary code with the privileges of the process, or
48 cause a Denial of Service condition.
49
50 Workaround
51 ==========
52
53 If patching is not feasible, the suggested workaround is to include
54 checks to verify whether or not a file exists before passing to PHP.
55
56 Resolution
57 ==========
58
59 All PHP 7.1 users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=dev-lang/php-7.1.33"
63
64 All PHP 7.2 users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=dev-lang/php-7.2.24"
68
69 All PHP 7.3 users should upgrade to the latest version:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose ">=dev-lang/php-7.3.11"
73
74 References
75 ==========
76
77 [ 1 ] CVE-2019-11043
78 https://nvd.nist.gov/vuln/detail/CVE-2019-11043
79
80 Availability
81 ============
82
83 This GLSA and any updates to it are available for viewing at
84 the Gentoo Security Website:
85
86 https://security.gentoo.org/glsa/201910-01
87
88 Concerns?
89 =========
90
91 Security is a primary focus of Gentoo Linux and ensuring the
92 confidentiality and security of our users' machines is of utmost
93 importance to us. Any security concerns should be addressed to
94 security@g.o or alternatively, you may file a bug at
95 https://bugs.gentoo.org.
96
97 License
98 =======
99
100 Copyright 2019 Gentoo Foundation, Inc; referenced text
101 belongs to its owner(s).
102
103 The contents of this document are licensed under the
104 Creative Commons - Attribution / Share Alike license.
105
106 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature