Mageia alert MGASA-2021-0519 (php)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2021-0519: Updated php packages fix security vulnerability | |
Date: | Sat, 20 Nov 2021 20:32:06 +0100 | |
Message-ID: | <20211120193206.6357D9F640@duvel.mageia.org> | |
Archive-link: | Article |
MGASA-2021-0519 - Updated php packages fix security vulnerability Publication date: 20 Nov 2021 URL: https://advisories.mageia.org/MGASA-2021-0519.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-21707 Description: Header injection via default_mimetype / default_charset mbstring may use pointer from some previous request Unexpected behavior with arrays and JIT Special character is breaking the path in xml function (CVE-2021-21707) XMLReader::getParserProperty may throw with a valid property References: - https://bugs.mageia.org/show_bug.cgi?id=29673 - https://www.php.net/ChangeLog-8.php#8.0.13 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... SRPMS: - 8/core/php-8.0.13-1.mga8