USN-6841-1: PHP vulnerability
19 June 2024
PHP could be made to accept invalid URLs.
Releases
Packages
- php7.4 - HTML-embedded scripting language interpreter
- php8.1 - HTML-embedded scripting language interpreter
- php8.2 - server-side, HTML-embedded scripting language (metapackage)
- php8.3 - server-side, HTML-embedded scripting language (metapackage)
Details
It was discovered that PHP could early return in the filter_var function
resulting in invalid user information being treated as valid user
information. An attacker could possibly use this issue to expose raw
user input information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.04
-
libapache2-mod-php8.3
-
8.3.6-0ubuntu0.24.04.1
-
php8.3
-
8.3.6-0ubuntu0.24.04.1
-
php8.3-cgi
-
8.3.6-0ubuntu0.24.04.1
-
php8.3-cli
-
8.3.6-0ubuntu0.24.04.1
-
php8.3-fpm
-
8.3.6-0ubuntu0.24.04.1
Ubuntu 23.10
-
libapache2-mod-php8.2
-
8.2.10-2ubuntu2.2
-
php8.2
-
8.2.10-2ubuntu2.2
-
php8.2-cgi
-
8.2.10-2ubuntu2.2
-
php8.2-cli
-
8.2.10-2ubuntu2.2
-
php8.2-fpm
-
8.2.10-2ubuntu2.2
Ubuntu 22.04
-
libapache2-mod-php8.1
-
8.1.2-1ubuntu2.18
-
php8.1
-
8.1.2-1ubuntu2.18
-
php8.1-cgi
-
8.1.2-1ubuntu2.18
-
php8.1-cli
-
8.1.2-1ubuntu2.18
-
php8.1-fpm
-
8.1.2-1ubuntu2.18
Ubuntu 20.04
-
libapache2-mod-php7.4
-
7.4.3-4ubuntu2.23
-
php7.4
-
7.4.3-4ubuntu2.23
-
php7.4-cgi
-
7.4.3-4ubuntu2.23
-
php7.4-cli
-
7.4.3-4ubuntu2.23
-
php7.4-fpm
-
7.4.3-4ubuntu2.23
In general, a standard system update will make all the necessary changes.