SUSE-SU-2022:0577-1: moderate: Security update for php72
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Fri Feb 25 23:18:25 UTC 2022
SUSE Security Update: Security update for php72
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:0577-1
Rating: moderate
References: #1038980 #1081790 #1193041
Cross-References: CVE-2015-9253 CVE-2017-8923 CVE-2021-21707
CVSS scores:
CVE-2015-9253 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2015-9253 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-8923 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-8923 (SUSE): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-21707 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2021-21707 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
SUSE Linux Enterprise High Performance Computing 12
SUSE Linux Enterprise Module for Web Scripting 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 12-SP3
SUSE Linux Enterprise Server for SAP Applications 12-SP4
SUSE Linux Enterprise Server for SAP Applications 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP5
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for php72 fixes the following issues:
- CVE-2015-9253: Fixed endless loop when the master process restarts a
child process using program execution functions (bsc#1081790).
- CVE-2017-8923: Fixed denial of service (application crash) when using .=
with a long string (zend_string_extend func in Zend/zend_string.h)
(bsc#1038980).
- CVE-2021-21707: Fixed special character handling that broke path in xml
parsing (bsc#1193041).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-577=1
- SUSE Linux Enterprise Module for Web Scripting 12:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2022-577=1
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
php72-debuginfo-7.2.5-1.75.1
php72-debugsource-7.2.5-1.75.1
php72-devel-7.2.5-1.75.1
- SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64):
apache2-mod_php72-7.2.5-1.75.1
apache2-mod_php72-debuginfo-7.2.5-1.75.1
php72-7.2.5-1.75.1
php72-bcmath-7.2.5-1.75.1
php72-bcmath-debuginfo-7.2.5-1.75.1
php72-bz2-7.2.5-1.75.1
php72-bz2-debuginfo-7.2.5-1.75.1
php72-calendar-7.2.5-1.75.1
php72-calendar-debuginfo-7.2.5-1.75.1
php72-ctype-7.2.5-1.75.1
php72-ctype-debuginfo-7.2.5-1.75.1
php72-curl-7.2.5-1.75.1
php72-curl-debuginfo-7.2.5-1.75.1
php72-dba-7.2.5-1.75.1
php72-dba-debuginfo-7.2.5-1.75.1
php72-debuginfo-7.2.5-1.75.1
php72-debugsource-7.2.5-1.75.1
php72-dom-7.2.5-1.75.1
php72-dom-debuginfo-7.2.5-1.75.1
php72-enchant-7.2.5-1.75.1
php72-enchant-debuginfo-7.2.5-1.75.1
php72-exif-7.2.5-1.75.1
php72-exif-debuginfo-7.2.5-1.75.1
php72-fastcgi-7.2.5-1.75.1
php72-fastcgi-debuginfo-7.2.5-1.75.1
php72-fileinfo-7.2.5-1.75.1
php72-fileinfo-debuginfo-7.2.5-1.75.1
php72-fpm-7.2.5-1.75.1
php72-fpm-debuginfo-7.2.5-1.75.1
php72-ftp-7.2.5-1.75.1
php72-ftp-debuginfo-7.2.5-1.75.1
php72-gd-7.2.5-1.75.1
php72-gd-debuginfo-7.2.5-1.75.1
php72-gettext-7.2.5-1.75.1
php72-gettext-debuginfo-7.2.5-1.75.1
php72-gmp-7.2.5-1.75.1
php72-gmp-debuginfo-7.2.5-1.75.1
php72-iconv-7.2.5-1.75.1
php72-iconv-debuginfo-7.2.5-1.75.1
php72-imap-7.2.5-1.75.1
php72-imap-debuginfo-7.2.5-1.75.1
php72-intl-7.2.5-1.75.1
php72-intl-debuginfo-7.2.5-1.75.1
php72-json-7.2.5-1.75.1
php72-json-debuginfo-7.2.5-1.75.1
php72-ldap-7.2.5-1.75.1
php72-ldap-debuginfo-7.2.5-1.75.1
php72-mbstring-7.2.5-1.75.1
php72-mbstring-debuginfo-7.2.5-1.75.1
php72-mysql-7.2.5-1.75.1
php72-mysql-debuginfo-7.2.5-1.75.1
php72-odbc-7.2.5-1.75.1
php72-odbc-debuginfo-7.2.5-1.75.1
php72-opcache-7.2.5-1.75.1
php72-opcache-debuginfo-7.2.5-1.75.1
php72-openssl-7.2.5-1.75.1
php72-openssl-debuginfo-7.2.5-1.75.1
php72-pcntl-7.2.5-1.75.1
php72-pcntl-debuginfo-7.2.5-1.75.1
php72-pdo-7.2.5-1.75.1
php72-pdo-debuginfo-7.2.5-1.75.1
php72-pgsql-7.2.5-1.75.1
php72-pgsql-debuginfo-7.2.5-1.75.1
php72-phar-7.2.5-1.75.1
php72-phar-debuginfo-7.2.5-1.75.1
php72-posix-7.2.5-1.75.1
php72-posix-debuginfo-7.2.5-1.75.1
php72-pspell-7.2.5-1.75.1
php72-pspell-debuginfo-7.2.5-1.75.1
php72-readline-7.2.5-1.75.1
php72-readline-debuginfo-7.2.5-1.75.1
php72-shmop-7.2.5-1.75.1
php72-shmop-debuginfo-7.2.5-1.75.1
php72-snmp-7.2.5-1.75.1
php72-snmp-debuginfo-7.2.5-1.75.1
php72-soap-7.2.5-1.75.1
php72-soap-debuginfo-7.2.5-1.75.1
php72-sockets-7.2.5-1.75.1
php72-sockets-debuginfo-7.2.5-1.75.1
php72-sodium-7.2.5-1.75.1
php72-sodium-debuginfo-7.2.5-1.75.1
php72-sqlite-7.2.5-1.75.1
php72-sqlite-debuginfo-7.2.5-1.75.1
php72-sysvmsg-7.2.5-1.75.1
php72-sysvmsg-debuginfo-7.2.5-1.75.1
php72-sysvsem-7.2.5-1.75.1
php72-sysvsem-debuginfo-7.2.5-1.75.1
php72-sysvshm-7.2.5-1.75.1
php72-sysvshm-debuginfo-7.2.5-1.75.1
php72-tidy-7.2.5-1.75.1
php72-tidy-debuginfo-7.2.5-1.75.1
php72-tokenizer-7.2.5-1.75.1
php72-tokenizer-debuginfo-7.2.5-1.75.1
php72-wddx-7.2.5-1.75.1
php72-wddx-debuginfo-7.2.5-1.75.1
php72-xmlreader-7.2.5-1.75.1
php72-xmlreader-debuginfo-7.2.5-1.75.1
php72-xmlrpc-7.2.5-1.75.1
php72-xmlrpc-debuginfo-7.2.5-1.75.1
php72-xmlwriter-7.2.5-1.75.1
php72-xmlwriter-debuginfo-7.2.5-1.75.1
php72-xsl-7.2.5-1.75.1
php72-xsl-debuginfo-7.2.5-1.75.1
php72-zip-7.2.5-1.75.1
php72-zip-debuginfo-7.2.5-1.75.1
php72-zlib-7.2.5-1.75.1
php72-zlib-debuginfo-7.2.5-1.75.1
- SUSE Linux Enterprise Module for Web Scripting 12 (noarch):
php72-pear-7.2.5-1.75.1
php72-pear-Archive_Tar-7.2.5-1.75.1
References:
https://www.suse.com/security/cve/CVE-2015-9253.html
https://www.suse.com/security/cve/CVE-2017-8923.html
https://www.suse.com/security/cve/CVE-2021-21707.html
https://bugzilla.suse.com/1038980
https://bugzilla.suse.com/1081790
https://bugzilla.suse.com/1193041
More information about the sle-updates
mailing list