First published: Mon Oct 18 2021(Updated: )
Fixed bug (PHP-FPM oob R/W in root process leading to privilege escalation) (CVE-2021-21703).
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php7.3 | 7.3.31-1~deb10u1 7.3.31-1~deb10u5 | |
debian/php7.4 | 7.4.33-1+deb11u4 | |
PHP | <8.0.12 | 8.0.12 |
PHP | >=7.3.0<=7.3.31 | |
PHP | >=7.4.0<7.4.25 | |
PHP | >=8.0.0<8.0.12 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
NetApp Clustered Data ONTAP | ||
Oracle Communications Diameter Signaling Router | >=8.0.0.0<=8.5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21703 is a vulnerability in PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25, and 8.0.x below 8.0.12 that allows child worker processes running as lower-privileged users to access memory shared with the main FPM daemon process running as root, potentially leading to privilege escalation.
CVE-2021-21703 has a severity rating of high, with a severity value of 7.
To fix CVE-2021-21703, you should upgrade to PHP version 8.0.12 or apply the appropriate patches for PHP versions 7.3.x, 7.4.x, and 8.0.x.
You can find more information about CVE-2021-21703 on the official PHP website and the Openwall mailing list.
CVE-2021-21703 is associated with CWE-787 and CWE-284.