In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 7.8 |
References | () http://www.openwall.com/lists/oss-security/2021/10/26/7 - Mailing List, Patch, Third Party Advisory | |
References | () https://bugs.php.net/bug.php?id=81026 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/ - | |
References | () https://security.gentoo.org/glsa/202209-20 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211118-0003/ - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4992 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4993 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Vendor Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Vendor Advisory |
07 Nov 2023, 03:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-10-25 06:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21703
Mitre link : CVE-2021-21703
CVE.ORG link : CVE-2021-21703
JSON object : View
Products Affected
php
- php
oracle
- communications_diameter_signaling_router
netapp
- clustered_data_ontap
debian
- debian_linux
fedoraproject
- fedora