USN-6053-1: PHP vulnerability
Publication date
2 May 2023
Overview
PHP could be made to bypass password checking if a specially crafted input was provided.
Releases
Packages
- php7.0 - HTML-embedded scripting language interpreter
Details
It was discovered that PHP incorrectly handled certain invalid Blowfish
password hashes. An invalid password hash could possibly allow applications to
accept any password as valid, contrary to expectations.
It was discovered that PHP incorrectly handled certain invalid Blowfish
password hashes. An invalid password hash could possibly allow applications to
accept any password as valid, contrary to expectations.
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
16.04 xenial | php7.0-cgi – 7.0.33-0ubuntu0.16.04.16+esm6 | ||
php7.0-fpm – 7.0.33-0ubuntu0.16.04.16+esm6 | |||
php7.0-cli – 7.0.33-0ubuntu0.16.04.16+esm6 | |||
libapache2-mod-php7.0 – 7.0.33-0ubuntu0.16.04.16+esm6 | |||
php7.0 – 7.0.33-0ubuntu0.16.04.16+esm6 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.