Ubuntu 6841-2: PHP Security Advisory Updates
Summary
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: PHP could be made to accept invalid URLs. Software Description: - php7.2: HTML-embedded scripting language interpreter - php7.0: HTML-embedded scripting language interpreter Details: USN-6841-1 fixed a vulnerability in PHP. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information.
Update Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS libapache2-mod-php7.2 7.2.24-0ubuntu0.18.04.17+esm5 Available with Ubuntu Pro php7.2 7.2.24-0ubuntu0.18.04.17+esm5 Available with Ubuntu Pro php7.2-cgi 7.2.24-0ubuntu0.18.04.17+esm5 Available with Ubuntu Pro php7.2-cli 7.2.24-0ubuntu0.18.04.17+esm5 Available with Ubuntu Pro php7.2-fpm 7.2.24-0ubuntu0.18.04.17+esm5 Available with Ubuntu Pro Ubuntu 16.04 LTS libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.16+esm11 Available with Ubuntu Pro php7.0 7.0.33-0ubuntu0.16.04.16+esm11 Available with Ubuntu Pro php7.0-cgi 7.0.33-0ubuntu0.16.04.16+esm11 Available with Ubuntu Pro php7.0-cli 7.0.33-0ubuntu0.16.04.16+esm11 Available with Ubuntu Pro php7.0-fpm 7.0.33-0ubuntu0.16.04.16+esm11 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes.
References
https://ubuntu.com/security/notices/USN-6841-2
https://ubuntu.com/security/notices/USN-6841-1
CVE-2024-5458
Package Information