First published: Fri Feb 17 2023(Updated: )
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. <a href="https://bugs.php.net/bug.php?id=81746">https://bugs.php.net/bug.php?id=81746</a>
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <8.0.28 | |
PHP | <8.1.16 | |
PHP | <8.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2170770 is significant due to potential buffer overflow vulnerabilities.
To fix REDHAT-BUG-2170770, upgrade to PHP versions 8.0.28, 8.1.16, or 8.2.3 or later.
Affected PHP versions include 8.0.X before 8.0.28, 8.1.X before 8.1.16, and 8.2.X before 8.2.3.
The nature of the vulnerability in REDHAT-BUG-2170770 involves a core path resolution function allocating a buffer one byte too small.
Yes, REDHAT-BUG-2170770 can potentially lead to data corruption by overwriting memory beyond the allocated buffer.