It was discovered that PHP could early return in the filter_var function
resulting in invalid user information being treated as valid user
information. An attacker could possibly use this issue to expose raw
user input information.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 24.04 | noarch | libapache2-mod-php8.3 | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | libapache2-mod-php8.3-dbgsym | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | libphp8.3-embed | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | libphp8.3-embed-dbgsym | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | php8.3 | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | php8.3-bcmath | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | php8.3-bcmath-dbgsym | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | php8.3-bz2 | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | php8.3-bz2-dbgsym | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |
Ubuntu | 24.04 | noarch | php8.3-cgi | < 8.3.6-0ubuntu0.24.04.1 | UNKNOWN |