Advisories

MGASA-2021-0519 - Updated php packages fix security vulnerability

Publication date: 20 Nov 2021
URL: https://advisories.mageia.org/MGASA-2021-0519.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-21707

Header injection via default_mimetype / default_charset
mbstring may use pointer from some previous request
Unexpected behavior with arrays and JIT
Special character is breaking the path in xml function (CVE-2021-21707)
XMLReader::getParserProperty may throw with a valid property

References:
- https://bugs.mageia.org/show_bug.cgi?id=29673
- https://www.php.net/ChangeLog-8.php#8.0.13
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707

SRPMS:
- 8/core/php-8.0.13-1.mga8

Mageia 2021-0519: php security update

Summary

Header injection via default_mimetype / default_charset mbstring may use pointer from some previous request Unexpected behavior with arrays and JIT Special character is breaking the path in xml function (CVE-2021-21707) XMLReader::getParserProperty may throw with a valid property

Resolution

MGASA-2021-0519 - Updated php packages fix security vulnerability

References

- https://bugs.mageia.org/show_bug.cgi?id=29673

- https://www.php.net/ChangeLog-8.php#8.0.13

Severity
Issued Date: 20 Nov 2021
URL: https://advisories.mageia.org/MGASA-2021-0519.html
Type: security
CVE: CVE-2021-21707
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.