Thanks for reporting this issue, but the exploit linked above is not the
exploit for CVE-2021-21703, but an exploit for an unfixed use-after-free
in SplDoublyLinkedList which upstream doesn't consider to be a security
issue. It can be used to escape the sandbox, which is why it was used as
the first step in the proof of concept for the CVE-2021-21703 bug.

I would expect php to still crash when that particular exploit is run
against it, but the bug that caused CVE-2021-21703 should no longer be
exploitable.

** Changed in: php7.4 (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953244

Title:
  CVE-2021-21703 POC still cause segfault on php-fpm 7.4.3-4ubuntu2.7

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php7.4/+bug/1953244/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to