First published: Fri Dec 13 2024(Updated: )
USN-7157-1 fixed vulnerabilities in PHP. The patch for CVE-2024-8932 caused a regression in php7.4. This update fixes the problem. Original advisory details: It was discovered that PHP incorrectly handled certain inputs when processed with convert.quoted-printable decode filters. An attacker could possibly use this issue to expose sensitive information or cause a crash. (CVE-2024-11233) It was discovered that PHP incorrectly handled certain HTTP requests. An attacker could possibly use this issue to performing arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user. (CVE-2024-11234) It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2024-11236, CVE-2024-8932) It was discovered that PHP incorrectly handled certain MySQL requests. An attacker could possibly use this issue to cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server. (CVE-2024-8929)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libapache2-mod-php7.4 | <7.4.3-4ubuntu2.28 | 7.4.3-4ubuntu2.28 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/php7.4 | <7.4.3-4ubuntu2.28 | 7.4.3-4ubuntu2.28 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/php7.4-cgi | <7.4.3-4ubuntu2.28 | 7.4.3-4ubuntu2.28 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/php7.4-cli | <7.4.3-4ubuntu2.28 | 7.4.3-4ubuntu2.28 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/php7.4-ldap | <7.4.3-4ubuntu2.28 | 7.4.3-4ubuntu2.28 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.