File _patchinfo of Package patchinfo.22871
<patchinfo incident="22871">
<issue tracker="cve" id="2015-9253"/>
<issue tracker="cve" id="2021-21707"/>
<issue tracker="cve" id="2017-8923"/>
<issue tracker="bnc" id="1038980">VUL-1: CVE-2017-8923: php7: denial of service (application crash) by using .= with a long string (zend_string_extend func in Zend/zend_string.h)</issue>
<issue tracker="bnc" id="1081790">VUL-0: CVE-2015-9253: php5, php53, php7: The php-fpm master process restarts a child process in an endless loop when using program execution functions</issue>
<issue tracker="bnc" id="1193041">VUL-0: CVE-2021-21707: php72,php7,php74,php53,php5: php: special character breaks path in xml parsing</issue>
<packager>pgajdos</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for php72</summary>
<description>This update for php72 fixes the following issues:
- CVE-2015-9253: Fixed endless loop when the master process restarts a child process using program execution functions (bsc#1081790).
- CVE-2017-8923: Fixed denial of service (application crash) when using .= with a long string (zend_string_extend func in Zend/zend_string.h) (bsc#1038980).
- CVE-2021-21707: Fixed special character handling that broke path in xml parsing (bsc#1193041).
</description>
</patchinfo>