Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2021-21708: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2021-21708: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
02/27/2022
Created
03/04/2022
Added
03/02/2022
Modified
12/13/2022

Description

In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.

Solution(s)

  • suse-upgrade-apache2-mod_php7
  • suse-upgrade-apache2-mod_php74
  • suse-upgrade-php7
  • suse-upgrade-php7-bcmath
  • suse-upgrade-php7-bz2
  • suse-upgrade-php7-calendar
  • suse-upgrade-php7-cli
  • suse-upgrade-php7-ctype
  • suse-upgrade-php7-curl
  • suse-upgrade-php7-dba
  • suse-upgrade-php7-devel
  • suse-upgrade-php7-dom
  • suse-upgrade-php7-embed
  • suse-upgrade-php7-enchant
  • suse-upgrade-php7-exif
  • suse-upgrade-php7-fastcgi
  • suse-upgrade-php7-fileinfo
  • suse-upgrade-php7-firebird
  • suse-upgrade-php7-fpm
  • suse-upgrade-php7-ftp
  • suse-upgrade-php7-gd
  • suse-upgrade-php7-gettext
  • suse-upgrade-php7-gmp
  • suse-upgrade-php7-iconv
  • suse-upgrade-php7-intl
  • suse-upgrade-php7-json
  • suse-upgrade-php7-ldap
  • suse-upgrade-php7-mbstring
  • suse-upgrade-php7-mysql
  • suse-upgrade-php7-odbc
  • suse-upgrade-php7-opcache
  • suse-upgrade-php7-openssl
  • suse-upgrade-php7-pcntl
  • suse-upgrade-php7-pdo
  • suse-upgrade-php7-pgsql
  • suse-upgrade-php7-phar
  • suse-upgrade-php7-posix
  • suse-upgrade-php7-readline
  • suse-upgrade-php7-shmop
  • suse-upgrade-php7-snmp
  • suse-upgrade-php7-soap
  • suse-upgrade-php7-sockets
  • suse-upgrade-php7-sodium
  • suse-upgrade-php7-sqlite
  • suse-upgrade-php7-sysvmsg
  • suse-upgrade-php7-sysvsem
  • suse-upgrade-php7-sysvshm
  • suse-upgrade-php7-test
  • suse-upgrade-php7-tidy
  • suse-upgrade-php7-tokenizer
  • suse-upgrade-php7-xmlreader
  • suse-upgrade-php7-xmlrpc
  • suse-upgrade-php7-xmlwriter
  • suse-upgrade-php7-xsl
  • suse-upgrade-php7-zip
  • suse-upgrade-php7-zlib
  • suse-upgrade-php74
  • suse-upgrade-php74-bcmath
  • suse-upgrade-php74-bz2
  • suse-upgrade-php74-calendar
  • suse-upgrade-php74-ctype
  • suse-upgrade-php74-curl
  • suse-upgrade-php74-dba
  • suse-upgrade-php74-devel
  • suse-upgrade-php74-dom
  • suse-upgrade-php74-enchant
  • suse-upgrade-php74-exif
  • suse-upgrade-php74-fastcgi
  • suse-upgrade-php74-fileinfo
  • suse-upgrade-php74-fpm
  • suse-upgrade-php74-ftp
  • suse-upgrade-php74-gd
  • suse-upgrade-php74-gettext
  • suse-upgrade-php74-gmp
  • suse-upgrade-php74-iconv
  • suse-upgrade-php74-intl
  • suse-upgrade-php74-json
  • suse-upgrade-php74-ldap
  • suse-upgrade-php74-mbstring
  • suse-upgrade-php74-mysql
  • suse-upgrade-php74-odbc
  • suse-upgrade-php74-opcache
  • suse-upgrade-php74-openssl
  • suse-upgrade-php74-pcntl
  • suse-upgrade-php74-pdo
  • suse-upgrade-php74-pgsql
  • suse-upgrade-php74-phar
  • suse-upgrade-php74-posix
  • suse-upgrade-php74-readline
  • suse-upgrade-php74-shmop
  • suse-upgrade-php74-snmp
  • suse-upgrade-php74-soap
  • suse-upgrade-php74-sockets
  • suse-upgrade-php74-sodium
  • suse-upgrade-php74-sqlite
  • suse-upgrade-php74-sysvmsg
  • suse-upgrade-php74-sysvsem
  • suse-upgrade-php74-sysvshm
  • suse-upgrade-php74-tidy
  • suse-upgrade-php74-tokenizer
  • suse-upgrade-php74-xmlreader
  • suse-upgrade-php74-xmlrpc
  • suse-upgrade-php74-xmlwriter
  • suse-upgrade-php74-xsl
  • suse-upgrade-php74-zip
  • suse-upgrade-php74-zlib

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;