First published: Mon Sep 09 2024(Updated: )
USN-6841-1 fixed a vulnerability in PHP. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libapache2-mod-php7.2 | <7.2.24-0ubuntu0.18.04.17+esm5 | 7.2.24-0ubuntu0.18.04.17+esm5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/php7.2 | <7.2.24-0ubuntu0.18.04.17+esm5 | 7.2.24-0ubuntu0.18.04.17+esm5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/php7.2-cgi | <7.2.24-0ubuntu0.18.04.17+esm5 | 7.2.24-0ubuntu0.18.04.17+esm5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/php7.2-cli | <7.2.24-0ubuntu0.18.04.17+esm5 | 7.2.24-0ubuntu0.18.04.17+esm5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/php7.2-fpm | <7.2.24-0ubuntu0.18.04.17+esm5 | 7.2.24-0ubuntu0.18.04.17+esm5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libapache2-mod-php7.0 | <7.0.33-0ubuntu0.16.04.16+esm11 | 7.0.33-0ubuntu0.16.04.16+esm11 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/php7.0 | <7.0.33-0ubuntu0.16.04.16+esm11 | 7.0.33-0ubuntu0.16.04.16+esm11 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/php7.0-cgi | <7.0.33-0ubuntu0.16.04.16+esm11 | 7.0.33-0ubuntu0.16.04.16+esm11 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/php7.0-cli | <7.0.33-0ubuntu0.16.04.16+esm11 | 7.0.33-0ubuntu0.16.04.16+esm11 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/php7.0-fpm | <7.0.33-0ubuntu0.16.04.16+esm11 | 7.0.33-0ubuntu0.16.04.16+esm11 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.