ALT-PU-2021-3645-1
Closed vulnerabilities
BDU:2017-01814
Уязвимость функции zend_string_extend интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2021-03159
Уязвимость расширения SOAP интерпретатора PHP, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2021-05228
Уязвимость компонента SAPI расширения PHP-FPM интерпретатора языка программирования PHP, позволяющая нарушителю повысить свои привилегии до root
BDU:2021-06176
Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы
BDU:2022-02394
Уязвимость функции simplexml_load_file() интерпретатора PHP , позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-12-27
CVE-2017-8923
The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
Modified: 2024-11-21
CVE-2021-21702
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
- https://bugs.php.net/bug.php?id=80672
- https://bugs.php.net/bug.php?id=80672
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- GLSA-202105-23
- GLSA-202105-23
- https://security.netapp.com/advisory/ntap-20210312-0005/
- https://security.netapp.com/advisory/ntap-20210312-0005/
- DSA-4856
- DSA-4856
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2021-21703
In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.
- [oss-security] 20211026 CVE-2021-21703: PHP-FPM 5.3.7 <= 8.0.12 Local Root
- [oss-security] 20211026 CVE-2021-21703: PHP-FPM 5.3.7 <= 8.0.12 Local Root
- https://bugs.php.net/bug.php?id=81026
- https://bugs.php.net/bug.php?id=81026
- [debian-lts-announce] 20211027 [SECURITY] [DLA 2794-1] php7.0 security update
- [debian-lts-announce] 20211027 [SECURITY] [DLA 2794-1] php7.0 security update
- FEDORA-2021-02d218c3be
- FEDORA-2021-02d218c3be
- FEDORA-2021-9f68f5f752
- FEDORA-2021-9f68f5f752
- FEDORA-2021-4140b54de2
- FEDORA-2021-4140b54de2
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20211118-0003/
- https://security.netapp.com/advisory/ntap-20211118-0003/
- DSA-4992
- DSA-4992
- DSA-4993
- DSA-4993
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2021-21706
In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.
Modified: 2024-11-21
CVE-2021-21707
In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
- https://bugs.php.net/bug.php?id=79971
- https://bugs.php.net/bug.php?id=79971
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- https://security.netapp.com/advisory/ntap-20211223-0005/
- https://security.netapp.com/advisory/ntap-20211223-0005/
- DSA-5082
- DSA-5082
- https://www.tenable.com/security/tns-2022-09
- https://www.tenable.com/security/tns-2022-09