USN-6841-2: PHP vulnerability
9 September 2024
PHP could be made to accept invalid URLs.
Releases
Packages
- php7.0 - HTML-embedded scripting language interpreter
- php7.2 - HTML-embedded scripting language interpreter
Details
USN-6841-1 fixed a vulnerability in PHP. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that PHP could early return in the filter_var function
resulting in invalid user information being treated as valid user
information. An attacker could possibly use this issue to expose raw
user input information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libapache2-mod-php7.2
-
7.2.24-0ubuntu0.18.04.17+esm5
Available with Ubuntu Pro
-
php7.2
-
7.2.24-0ubuntu0.18.04.17+esm5
Available with Ubuntu Pro
-
php7.2-cgi
-
7.2.24-0ubuntu0.18.04.17+esm5
Available with Ubuntu Pro
-
php7.2-cli
-
7.2.24-0ubuntu0.18.04.17+esm5
Available with Ubuntu Pro
-
php7.2-fpm
-
7.2.24-0ubuntu0.18.04.17+esm5
Available with Ubuntu Pro
Ubuntu 16.04
-
libapache2-mod-php7.0
-
7.0.33-0ubuntu0.16.04.16+esm11
Available with Ubuntu Pro
-
php7.0
-
7.0.33-0ubuntu0.16.04.16+esm11
Available with Ubuntu Pro
-
php7.0-cgi
-
7.0.33-0ubuntu0.16.04.16+esm11
Available with Ubuntu Pro
-
php7.0-cli
-
7.0.33-0ubuntu0.16.04.16+esm11
Available with Ubuntu Pro
-
php7.0-fpm
-
7.0.33-0ubuntu0.16.04.16+esm11
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.