-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4553-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 28, 2019 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : php7.3 CVE ID : CVE-2019-11043 Emil Lerner and Andrew Danau discovered that insufficient validation in the path handling code of PHP FPM could result in the execution of arbitrary code in some setups. For the stable distribution (buster), this problem has been fixed in version 7.3.11-1~deb10u1. We recommend that you upgrade your php7.3 packages. For the detailed security status of php7.3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php7.3 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl23XW8ACgkQEMKTtsN8 TjZqdBAAjtqS6J+W7DRv/zq2zDi4IvdZo3vgO2EiVICak7+TWNfQ0aIP3LV73QQY +4y2NMoh9wVUE2nLQW8CJZUf0u5UOdIefnCpJ3hlqrjxtWt/8/7qSYk+AOpSKIUf EnNTGPk7+X7XKtRZq5v3ZbefjY+fLsZ7l2bMtUhfmtsqcYo/P8jd3bLHkNZQYpKd rJ73+zMYhk079v+8pD8gH3wikct4ollfbYcpL9dSvobWMgCPCLsaMWP28kI2ZPSC oEXsAIGT+nwhCMIwjcOrBmisyCqVqPUWGUiGxiKjxz7PMYj4auiSb7g+Y05xr7MQ a27yXXg19+UKKMgTpa8l8uJrhR16BxK+GRWBqX2B/lsXBu2HXQM2wC7ZLmOj19ai tm2u6qha38mr2NanI4l51P2HmYKNIHzD+3hPTfs0MLv9X8W7F1oIc/Ja/6BGWXfm wEe4vzpr3luw1u8PQXv/oNdOJ3YSHMIMj48RbISGT+itGsIPywmb6SOsoKWS8kMl JDJi7S7OwRUELFmeG0cJU0uLV6wluQo9bRrmFYJBTVry40fQ/jaaYd3FsJ207NhV iEbdPrT3lRrvGt399ZzYTemZeaQnOZ6igKzYxChdlRNjldqzGH3wsvkUnfnUNQlw 6EEWviBTYixhsyAZehq7NZ42BYLsyKdzSkBipCIDDAmxy/ogC2M= =J+6Z -----END PGP SIGNATURE-----