Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-7049-1

Ubuntu Security Notice 7049-1 - It was discovered that PHP incorrectly handled parsing multipart form data. A remote attacker could possibly use this issue to inject payloads and cause PHP to ignore legitimate data. It was discovered that PHP incorrectly handled the cgi.force_redirect configuration option due to environment variable collisions. In certain configurations, an attacker could possibly use this issue bypass force_redirect restrictions.

Packet Storm
#vulnerability#ubuntu#apache#git#php

==========================================================================
Ubuntu Security Notice USN-7049-1
October 01, 2024

php7.4, php8.1, php8.3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 24.04 LTS
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:

  • php8.3: HTML-embedded scripting language interpreter
  • php8.1: HTML-embedded scripting language interpreter
  • php7.4: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled parsing multipart form data.
A remote attacker could possibly use this issue to inject payloads and
cause PHP to ignore legitimate data. (CVE-2024-8925)

It was discovered that PHP incorrectly handled the cgi.force_redirect
configuration option due to environment variable collisions. In certain
configurations, an attacker could possibly use this issue bypass
force_redirect restrictions. (CVE-2024-8927)

It was discovered that PHP-FPM incorrectly handled logging. A remote
attacker could possibly use this issue to alter and inject arbitrary
contents into log files. This issue only affected Ubuntu 22.04 LTS, and
Ubuntu 24.04 LTS. (CVE-2024-9026)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
libapache2-mod-php8.3 8.3.6-0ubuntu0.24.04.2
php8.3-cgi 8.3.6-0ubuntu0.24.04.2
php8.3-cli 8.3.6-0ubuntu0.24.04.2
php8.3-fpm 8.3.6-0ubuntu0.24.04.2

Ubuntu 22.04 LTS
libapache2-mod-php8.1 8.1.2-1ubuntu2.19
php8.1-cgi 8.1.2-1ubuntu2.19
php8.1-cli 8.1.2-1ubuntu2.19
php8.1-fpm 8.1.2-1ubuntu2.19

Ubuntu 20.04 LTS
libapache2-mod-php7.4 7.4.3-4ubuntu2.24
php7.4-cgi 7.4.3-4ubuntu2.24
php7.4-cli 7.4.3-4ubuntu2.24
php7.4-fpm 7.4.3-4ubuntu2.24

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7049-1
CVE-2024-8925, CVE-2024-8927, CVE-2024-9026

Package Information:
https://launchpad.net/ubuntu/+source/php8.3/8.3.6-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.19
https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.24

Related news

Debian Security Advisory 5780-1

Debian Linux Security Advisory 5780-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in incorrect parsing of multipart/form-data, bypass of the cgi.force_direct directive or incorrect logging.

Packet Storm: Latest News

Scapy Packet Manipulation Tool 2.6.1