vulnerability

Rocky Linux: CVE-2023-0568: php-7.4 (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Feb 16, 2023
Added
Mar 5, 2024
Modified
Mar 31, 2026

Description

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.

Solutions

rocky-upgrade-libziprocky-upgrade-libzip-debuginforocky-upgrade-libzip-debugsourcerocky-upgrade-libzip-develrocky-upgrade-libzip-toolsrocky-upgrade-libzip-tools-debuginforocky-upgrade-phprocky-upgrade-php-bcmathrocky-upgrade-php-bcmath-debuginforocky-upgrade-php-clirocky-upgrade-php-cli-debuginforocky-upgrade-php-commonrocky-upgrade-php-common-debuginforocky-upgrade-php-dbarocky-upgrade-php-dba-debuginforocky-upgrade-php-dbgrocky-upgrade-php-dbg-debuginforocky-upgrade-php-debuginforocky-upgrade-php-debugsourcerocky-upgrade-php-develrocky-upgrade-php-embeddedrocky-upgrade-php-embedded-debuginforocky-upgrade-php-enchantrocky-upgrade-php-enchant-debuginforocky-upgrade-php-ffirocky-upgrade-php-ffi-debuginforocky-upgrade-php-fpmrocky-upgrade-php-fpm-debuginforocky-upgrade-php-gdrocky-upgrade-php-gd-debuginforocky-upgrade-php-gmprocky-upgrade-php-gmp-debuginforocky-upgrade-php-intlrocky-upgrade-php-intl-debuginforocky-upgrade-php-jsonrocky-upgrade-php-json-debuginforocky-upgrade-php-ldaprocky-upgrade-php-ldap-debuginforocky-upgrade-php-mbstringrocky-upgrade-php-mbstring-debuginforocky-upgrade-php-mysqlndrocky-upgrade-php-mysqlnd-debuginforocky-upgrade-php-odbcrocky-upgrade-php-odbc-debuginforocky-upgrade-php-opcacherocky-upgrade-php-opcache-debuginforocky-upgrade-php-pdorocky-upgrade-php-pdo-debuginforocky-upgrade-php-pecl-apcurocky-upgrade-php-pecl-apcu-debuginforocky-upgrade-php-pecl-apcu-debugsourcerocky-upgrade-php-pecl-apcu-develrocky-upgrade-php-pecl-rrdrocky-upgrade-php-pecl-rrd-debuginforocky-upgrade-php-pecl-rrd-debugsourcerocky-upgrade-php-pecl-xdebugrocky-upgrade-php-pecl-xdebug-debuginforocky-upgrade-php-pecl-xdebug-debugsourcerocky-upgrade-php-pecl-xdebug3rocky-upgrade-php-pecl-xdebug3-debuginforocky-upgrade-php-pecl-xdebug3-debugsourcerocky-upgrade-php-pecl-ziprocky-upgrade-php-pecl-zip-debuginforocky-upgrade-php-pecl-zip-debugsourcerocky-upgrade-php-pgsqlrocky-upgrade-php-pgsql-debuginforocky-upgrade-php-processrocky-upgrade-php-process-debuginforocky-upgrade-php-snmprocky-upgrade-php-snmp-debuginforocky-upgrade-php-soaprocky-upgrade-php-soap-debuginforocky-upgrade-php-xmlrocky-upgrade-php-xml-debuginforocky-upgrade-php-xmlrpcrocky-upgrade-php-xmlrpc-debuginfo
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.