CVE-2026-7568

Publication date 11 May 2026

Last updated 13 May 2026


Ubuntu priority

Description

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.

Read the notes from the security team

Status

Package Ubuntu Release Status
php5 26.04 LTS resolute Not in release
25.10 questing Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
14.04 LTS trusty
Needs evaluation
php7.0 26.04 LTS resolute Not in release
25.10 questing Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
16.04 LTS xenial
Needs evaluation
php7.2 26.04 LTS resolute Not in release
25.10 questing Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
18.04 LTS bionic
Needs evaluation
php7.4 26.04 LTS resolute Not in release
25.10 questing Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Needs evaluation
php8.1 26.04 LTS resolute Not in release
25.10 questing Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Needs evaluation
php8.3 26.04 LTS resolute Not in release
25.10 questing Not in release
24.04 LTS noble
Needs evaluation
22.04 LTS jammy Not in release
php8.4 26.04 LTS resolute Not in release
25.10 questing
Needs evaluation
24.04 LTS noble Not in release
22.04 LTS jammy Not in release

Notes


sbeattie

PEAR issues should go against php-pear as of xenial


Access our resources on patching vulnerabilities