In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://bugs.php.net/bug.php?id=81746 | patch exploit vendor advisory issue tracking |
https://security.netapp.com/advisory/ntap-20230517-0001/ |