|
|
Subscribe / Log in / New account

Arch Linux alert ASA-202102-15 (php)

From:  Remi Gacogne via arch-security <arch-security@lists.archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-202102-15] php: denial of service
Date:  Fri, 12 Feb 2021 08:07:58 +0100
Message-ID:  <6a00a21b-a9d8-87f3-48e4-133e33c60511@archlinux.org>
Cc:  Remi Gacogne <rgacogne@archlinux.org>

Arch Linux Security Advisory ASA-202102-15 ========================================== Severity: Medium Date : 2021-02-07 CVE-ID : CVE-2021-21702 Package : php Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-1531 Summary ======= The package php before version 8.0.2-1 is vulnerable to denial of service. Resolution ========== Upgrade to 8.0.2-1. # pacman -Syu "php>=8.0.2-1" The problem has been fixed upstream in version 8.0.2. Workaround ========== None. Description =========== A security issue was found in PHP before versions 8.0.2, 7.4.15 and 7.3.27. PHP will crash with a SIGSEGV via null-pointer dereference whenever an XML is provided to the SoapClient query() function without an existing field. The issue is fixed in versions 8.0.2, 7.4.15 and 7.3.27. Impact ====== A remote attacker might be able to crash PHP via a specially crafted XML payload. References ========== https://bugs.php.net/bug.php?id=80672 https://git.php.net/?p=php-src.git;a=commitdiff;h=f733ee1... https://git.php.net/?p=php-src.git;a=commitdiff;h=91655b4... https://git.php.net/?p=php-src.git;a=commitdiff;h=3c939e3... https://security.archlinux.org/CVE-2021-21702


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds