CVE-2023-0568

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-0568
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0568.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-0568
Aliases
Related
Published
2023-02-16T07:15:10Z
Modified
2024-10-12T10:25:53.713368Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. 

References

Affected packages

Debian:11 / php7.4

Package

Name
php7.4
Purl
pkg:deb/debian/php7.4?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.4.33-1+deb11u3

Affected versions

7.*

7.4.21-1+deb11u1
7.4.25-1+deb11u1
7.4.26-1
7.4.28-1+deb11u1
7.4.30-1+deb11u1
7.4.33-1+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / php8.2

Package

Name
php8.2
Purl
pkg:deb/debian/php8.2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.2.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / php8.2

Package

Name
php8.2
Purl
pkg:deb/debian/php8.2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.2.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/php/php-src

Affected ranges

Type
GIT
Repo
https://github.com/php/php-src
Events