[USN-6841-1] PHP vulnerability

Leonidas S. Barbosa leo.barbosa at canonical.com
Wed Jun 19 13:22:24 UTC 2024


==========================================================================
Ubuntu Security Notice USN-6841-1
June 19, 2024

php7.4, php8.1, php8.2, php8.3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

PHP could be made to accept invalid URLs.

Software Description:
- php8.3: server-side, HTML-embedded scripting language (metapackage)
- php8.2: server-side, HTML-embedded scripting language (metapackage)
- php8.1: HTML-embedded scripting language interpreter
- php7.4: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP could early return in the filter_var function
resulting in invalid user information being treated as valid user
information. An attacker could possibly use this issue to expose raw
user input information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libapache2-mod-php8.3           8.3.6-0ubuntu0.24.04.1
  php8.3                          8.3.6-0ubuntu0.24.04.1
  php8.3-cgi                      8.3.6-0ubuntu0.24.04.1
  php8.3-cli                      8.3.6-0ubuntu0.24.04.1
  php8.3-fpm                      8.3.6-0ubuntu0.24.04.1

Ubuntu 23.10
  libapache2-mod-php8.2           8.2.10-2ubuntu2.2
  php8.2                          8.2.10-2ubuntu2.2
  php8.2-cgi                      8.2.10-2ubuntu2.2
  php8.2-cli                      8.2.10-2ubuntu2.2
  php8.2-fpm                      8.2.10-2ubuntu2.2

Ubuntu 22.04 LTS
  libapache2-mod-php8.1           8.1.2-1ubuntu2.18
  php8.1                          8.1.2-1ubuntu2.18
  php8.1-cgi                      8.1.2-1ubuntu2.18
  php8.1-cli                      8.1.2-1ubuntu2.18
  php8.1-fpm                      8.1.2-1ubuntu2.18

Ubuntu 20.04 LTS
  libapache2-mod-php7.4           7.4.3-4ubuntu2.23
  php7.4                          7.4.3-4ubuntu2.23
  php7.4-cgi                      7.4.3-4ubuntu2.23
  php7.4-cli                      7.4.3-4ubuntu2.23
  php7.4-fpm                      7.4.3-4ubuntu2.23

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6841-1
  CVE-2024-5458

Package Information:
  https://launchpad.net/ubuntu/+source/php8.3/8.3.6-0ubuntu0.24.04.1
  https://launchpad.net/ubuntu/+source/php8.2/8.2.10-2ubuntu2.2
  https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.18
  https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.23

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240619/89e2db4f/attachment.sig>


More information about the ubuntu-security-announce mailing list