DEBIAN-CVE-2023-0568

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-0568
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-0568.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-0568
Upstream
Published
2023-02-16T07:15:10Z
Modified
2025-09-19T07:33:10.281794Z
Summary
[none]
Details

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.

References

Affected packages

Debian:11 / php7.4

Package

Name
php7.4
Purl
pkg:deb/debian/php7.4?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.4.33-1+deb11u3

Affected versions

7.*

7.4.21-1+deb11u1
7.4.25-1+deb11u1
7.4.26-1
7.4.28-1+deb11u1
7.4.30-1+deb11u1
7.4.33-1+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / php8.2

Package

Name
php8.2
Purl
pkg:deb/debian/php8.2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.2.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}