Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2021.0501
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2021-0501)
Zusammenfassung:The remote host is missing an update for the 'php' package(s) announced via the MGASA-2021-0501 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'php' package(s) announced via the MGASA-2021-0501 advisory.

Vulnerability Insight:
Updated php packages fix security vulnerability:

In PHP versions 8.0.x below 8.0.12, when running PHP FPM SAPI with main
FPM daemon process running as root and child worker processes running as
lower-privileged users, it is possible for the child processes to access
memory shared with the main process and write to it, modifying it in a
way that would cause the root process to conduct invalid memory reads and
writes, which can be used to escalate privileges from local unprivileged
user to the root user (CVE-2021-21703).

The php packages have been updated to 8.0.12 that fixes this issue and
other bugs.

Affected Software/OS:
'php' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-21703
https://security.netapp.com/advisory/ntap-20211118-0003/
Debian Security Information: DSA-4992 (Google Search)
https://www.debian.org/security/2021/dsa-4992
Debian Security Information: DSA-4993 (Google Search)
https://www.debian.org/security/2021/dsa-4993
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/
https://security.gentoo.org/glsa/202209-20
https://bugs.php.net/bug.php?id=81026
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html
http://www.openwall.com/lists/oss-security/2021/10/26/7
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.