|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0519 (php)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0519: Updated php packages fix security vulnerability
Date:  Sat, 20 Nov 2021 20:32:06 +0100
Message-ID:  <20211120193206.6357D9F640@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0519 - Updated php packages fix security vulnerability Publication date: 20 Nov 2021 URL: https://advisories.mageia.org/MGASA-2021-0519.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-21707 Description: Header injection via default_mimetype / default_charset mbstring may use pointer from some previous request Unexpected behavior with arrays and JIT Special character is breaking the path in xml function (CVE-2021-21707) XMLReader::getParserProperty may throw with a valid property References: - https://bugs.mageia.org/show_bug.cgi?id=29673 - https://www.php.net/ChangeLog-8.php#8.0.13 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... SRPMS: - 8/core/php-8.0.13-1.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds