Описание
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | needed | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
lunar | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra/focal | DNE | |
esm-infra/xenial | released | 7.0.33-0ubuntu0.16.04.16+esm8 |
focal | DNE | |
jammy | DNE | |
lunar | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | DNE | |
esm-infra/bionic | released | 7.2.24-0ubuntu0.18.04.17+esm2 |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
lunar | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra/focal | not-affected | 7.4.3-4ubuntu2.20 |
focal | released | 7.4.3-4ubuntu2.20 |
jammy | DNE | |
lunar | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | released | 8.1.2-1ubuntu2.14 |
lunar | released | 8.1.12-1ubuntu4.3 |
mantic | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
lunar | DNE | |
mantic | not-affected | 8.2.10-2ubuntu1 |
noble | DNE | |
oracular | DNE | |
plucky | DNE |
Показывать по
Ссылки на источники
EPSS
9.4 Critical
CVSS3
Связанные уязвимости
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* bef ...
Уязвимость функции phar_dir_read() интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
EPSS
9.4 Critical
CVSS3