Описание
Security update for php72
This update for php72 fixes the following issues:
- CVE-2021-21705 [bsc#1188037]: SSRF bypass in FILTER_VALIDATE_URL
Список пакетов
SUSE Linux Enterprise Module for Web and Scripting 12
apache2-mod_php72-7.2.5-1.63.2
php72-7.2.5-1.63.2
php72-bcmath-7.2.5-1.63.2
php72-bz2-7.2.5-1.63.2
php72-calendar-7.2.5-1.63.2
php72-ctype-7.2.5-1.63.2
php72-curl-7.2.5-1.63.2
php72-dba-7.2.5-1.63.2
php72-dom-7.2.5-1.63.2
php72-enchant-7.2.5-1.63.2
php72-exif-7.2.5-1.63.2
php72-fastcgi-7.2.5-1.63.2
php72-fileinfo-7.2.5-1.63.2
php72-fpm-7.2.5-1.63.2
php72-ftp-7.2.5-1.63.2
php72-gd-7.2.5-1.63.2
php72-gettext-7.2.5-1.63.2
php72-gmp-7.2.5-1.63.2
php72-iconv-7.2.5-1.63.2
php72-imap-7.2.5-1.63.2
php72-intl-7.2.5-1.63.2
php72-json-7.2.5-1.63.2
php72-ldap-7.2.5-1.63.2
php72-mbstring-7.2.5-1.63.2
php72-mysql-7.2.5-1.63.2
php72-odbc-7.2.5-1.63.2
php72-opcache-7.2.5-1.63.2
php72-openssl-7.2.5-1.63.2
php72-pcntl-7.2.5-1.63.2
php72-pdo-7.2.5-1.63.2
php72-pear-7.2.5-1.63.2
php72-pear-Archive_Tar-7.2.5-1.63.2
php72-pgsql-7.2.5-1.63.2
php72-phar-7.2.5-1.63.2
php72-posix-7.2.5-1.63.2
php72-pspell-7.2.5-1.63.2
php72-readline-7.2.5-1.63.2
php72-shmop-7.2.5-1.63.2
php72-snmp-7.2.5-1.63.2
php72-soap-7.2.5-1.63.2
php72-sockets-7.2.5-1.63.2
php72-sodium-7.2.5-1.63.2
php72-sqlite-7.2.5-1.63.2
php72-sysvmsg-7.2.5-1.63.2
php72-sysvsem-7.2.5-1.63.2
php72-sysvshm-7.2.5-1.63.2
php72-tidy-7.2.5-1.63.2
php72-tokenizer-7.2.5-1.63.2
php72-wddx-7.2.5-1.63.2
php72-xmlreader-7.2.5-1.63.2
php72-xmlrpc-7.2.5-1.63.2
php72-xmlwriter-7.2.5-1.63.2
php72-xsl-7.2.5-1.63.2
php72-zip-7.2.5-1.63.2
php72-zlib-7.2.5-1.63.2
SUSE Linux Enterprise Software Development Kit 12 SP5
php72-devel-7.2.5-1.63.2
Ссылки
- Link for SUSE-SU-2021:2564-1
- E-Mail link for SUSE-SU-2021:2564-1
- SUSE Security Ratings
- SUSE Bug 1188037
- SUSE CVE CVE-2021-21705 page
Описание
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 12:apache2-mod_php72-7.2.5-1.63.2
SUSE Linux Enterprise Module for Web and Scripting 12:php72-7.2.5-1.63.2
SUSE Linux Enterprise Module for Web and Scripting 12:php72-bcmath-7.2.5-1.63.2
SUSE Linux Enterprise Module for Web and Scripting 12:php72-bz2-7.2.5-1.63.2
Ссылки
- CVE-2021-21705
- SUSE Bug 1188037