----------------------------------------------------------------------------------
@MSGID:
<ba182ff9-a4bd-50f8-84be-1cbffe765294@canonical.com> 86ed6205
@REPLYADDR Camila Camargo de Matos
<camila.camargodematos@canonical.com>
@REPLYTO 2:5075/128 Camila Camargo de Matos
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<ba182ff9-a4bd-50f8-84be-1cbffe765294@canonical.com>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============6288801182772096852=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: -0300
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-6053-1
May 02, 2023
php7.0 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
PHP could be made to bypass password checking if a specially crafted input was
provided.
Software Description:
- php7.0: HTML-embedded scripting language interpreter
Details:
It was discovered that PHP incorrectly handled certain invalid Blowfish
password hashes. An invalid password hash could possibly allow applications to
accept any password as valid, contrary to expectations.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
libapache2-mod-php7.0 7.0.33-0ubuntu0.16.04.16+esm6
php7.0 7.0.33-0ubuntu0.16.04.16+esm6
php7.0-cgi 7.0.33-0ubuntu0.16.04.16+esm6
php7.0-cli 7.0.33-0ubuntu0.16.04.16+esm6
php7.0-fpm 7.0.33-0ubuntu0.16.04.16+esm6
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6053-1
CVE-2023-0567
--- FIDOGATE 5.12-ge4e8b94
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441