In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
The product calls free() on a pointer to memory that was not allocated using associated heap allocation functions such as malloc(), calloc(), or realloc().
The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.
Link | Tags |
---|---|
https://bugs.php.net/bug.php?id=81720 | issue tracking mailing list patch vendor advisory exploit |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZTZQKRGEYJT5UB4FGG3MOE72SQUHSL4/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3T4MMEEZYYAEHPQMZDFN44PHORJWJFZQ/ | vendor advisory |
https://www.debian.org/security/2022/dsa-5179 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20220722-0005/ | third party advisory |
https://security.gentoo.org/glsa/202209-20 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html | third party advisory mailing list |