USN-7049-2: PHP vulnerabilities
14 November 2024
Several security issues were fixed in PHP.
Releases
Packages
- php7.0 - HTML-embedded scripting language interpreter
- php7.2 - HTML-embedded scripting language interpreter
Details
USN-7049-1 fixed vulnerabilities in PHP. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that PHP incorrectly handled parsing multipart form
data. A remote attacker could possibly use this issue to inject payloads
and cause PHP to ignore legitimate data. (CVE-2024-8925)
It was discovered that PHP incorrectly handled the cgi.force_redirect
configuration option due to environment variable collisions. In certain
configurations, an attacker could possibly use this issue bypass
force_redirect restrictions. (CVE-2024-8927)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libapache2-mod-php7.2
-
7.2.24-0ubuntu0.18.04.17+esm6
Available with Ubuntu Pro
-
php7.2-cgi
-
7.2.24-0ubuntu0.18.04.17+esm6
Available with Ubuntu Pro
-
php7.2-cli
-
7.2.24-0ubuntu0.18.04.17+esm6
Available with Ubuntu Pro
-
php7.2-fpm
-
7.2.24-0ubuntu0.18.04.17+esm6
Available with Ubuntu Pro
Ubuntu 16.04
-
libapache2-mod-php7.0
-
7.0.33-0ubuntu0.16.04.16+esm12
Available with Ubuntu Pro
-
php7.0-cgi
-
7.0.33-0ubuntu0.16.04.16+esm12
Available with Ubuntu Pro
-
php7.0-cli
-
7.0.33-0ubuntu0.16.04.16+esm12
Available with Ubuntu Pro
-
php7.0-fpm
-
7.0.33-0ubuntu0.16.04.16+esm12
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.