Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6841-1

Ubuntu Security Notice 6841-1 - It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information.

Packet Storm
#vulnerability#ubuntu#apache#php

==========================================================================
Ubuntu Security Notice USN-6841-1
June 19, 2024

php7.4, php8.1, php8.2, php8.3 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 24.04 LTS
  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Summary:

PHP could be made to accept invalid URLs.

Software Description:

  • php8.3: server-side, HTML-embedded scripting language (metapackage)
  • php8.2: server-side, HTML-embedded scripting language (metapackage)
  • php8.1: HTML-embedded scripting language interpreter
  • php7.4: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP could early return in the filter_var function
resulting in invalid user information being treated as valid user
information. An attacker could possibly use this issue to expose raw
user input information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
libapache2-mod-php8.3 8.3.6-0ubuntu0.24.04.1
php8.3 8.3.6-0ubuntu0.24.04.1
php8.3-cgi 8.3.6-0ubuntu0.24.04.1
php8.3-cli 8.3.6-0ubuntu0.24.04.1
php8.3-fpm 8.3.6-0ubuntu0.24.04.1

Ubuntu 23.10
libapache2-mod-php8.2 8.2.10-2ubuntu2.2
php8.2 8.2.10-2ubuntu2.2
php8.2-cgi 8.2.10-2ubuntu2.2
php8.2-cli 8.2.10-2ubuntu2.2
php8.2-fpm 8.2.10-2ubuntu2.2

Ubuntu 22.04 LTS
libapache2-mod-php8.1 8.1.2-1ubuntu2.18
php8.1 8.1.2-1ubuntu2.18
php8.1-cgi 8.1.2-1ubuntu2.18
php8.1-cli 8.1.2-1ubuntu2.18
php8.1-fpm 8.1.2-1ubuntu2.18

Ubuntu 20.04 LTS
libapache2-mod-php7.4 7.4.3-4ubuntu2.23
php7.4 7.4.3-4ubuntu2.23
php7.4-cgi 7.4.3-4ubuntu2.23
php7.4-cli 7.4.3-4ubuntu2.23
php7.4-fpm 7.4.3-4ubuntu2.23

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6841-1
CVE-2024-5458

Package Information:
https://launchpad.net/ubuntu/+source/php8.3/8.3.6-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/php8.2/8.2.10-2ubuntu2.2
https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.18
https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.23

Related news

Gentoo Linux Security Advisory 202408-32

Gentoo Linux Security Advisory 202408-32 - Multiple vulnerabilities have been discovered in PHP, the worst of which can lead to a denial of service. Versions greater than or equal to 8.1.29:8.1 are affected.

Debian Security Advisory 5717-1

Debian Linux Security Advisory 5717-1 - It was discovered that user validation was incorrectly implemented for filter_var(FILTER_VALIDATE_URL) for php8.2.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution