CVE-2023-0568

Summary

CVECVE-2023-0568
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-02-16 07:15:00 UTC
Updated2023-05-17 20:15:00 UTC
DescriptionIn PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. 

Risk And Classification

Problem Types: CWE-770

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Php Php All All All All

References

ReferenceSourceLinkTags
February 2023 PHP Vulnerabilities in NetApp Products | NetApp Product Security MISC security.netapp.com
PHP :: Sec Bug #81746 :: 1-byte array overrun in common path resolve code MISC bugs.php.net
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 150653 PHP Incorrect Calculation of Buffer Size Vulnerability (CVE-2023-0568)
  • 161008 Oracle Enterprise Linux Security Update for Hypertext Preprocessor (PHP) (ELSA-2023-5926)
  • 161015 Oracle Enterprise Linux Security Update for php:8.0 (ELSA-2023-5927)
  • 161313 Oracle Enterprise Linux Security Update for php:8.1 (ELSA-2024-0387)
  • 181613 Debian Security Update for php7.3 (DLA 3345-1)
  • 181663 Debian Security Update for php7.4 (DSA 5363-1)
  • 181911 Debian Security Update for php8.2 (CVE-2023-0568)
  • 199197 Ubuntu Security Notification for Hypertext Preprocessor (PHP) Vulnerabilities (USN-5902-1)
  • 199545 Ubuntu Security Notification for Hypertext Preprocessor (PHP) Vulnerabilities (USN-5905-1)
  • 242223 Red Hat Update for Hypertext Preprocessor (PHP) (RHSA-2023:5926)
  • 242227 Red Hat Update for php:8.0 (RHSA-2023:5927)
  • 242739 Red Hat Update for php:8.1 (RHSA-2024:0387)
  • 283742 Fedora Security Update for Hypertext Preprocessor (PHP) (FEDORA-2023-d12ff09d38)
  • 283743 Fedora Security Update for Hypertext Preprocessor (PHP) (FEDORA-2023-452714dbc6)
  • 355229 Amazon Linux Security Advisory for php8.1 : ALAS2023-2023-139
  • 38890 Hypertext Preprocessor (PHP) Security Update (81746)
  • 502663 Alpine Linux Security Update for php8
  • 502679 Alpine Linux Security Update for php81
  • 502708 Alpine Linux Security Update for php7
  • 502911 Alpine Linux Security Update for php81
  • 503215 Alpine Linux Security Update for php82
  • 505790 Alpine Linux Security Update for php81
  • 506155 Alpine Linux Security Update for php82
  • 673101 EulerOS Security Update for Hypertext Preprocessor (PHP) (EulerOS-SA-2023-2196)
  • 753778 SUSE Enterprise Linux Security Update for php7 (SUSE-SU-2023:0476-1)
  • 753786 SUSE Enterprise Linux Security Update for php74 (SUSE-SU-2023:0515-1)
  • 753787 SUSE Enterprise Linux Security Update for php7 (SUSE-SU-2023:0514-1)
  • 905570 Common Base Linux Mariner (CBL-Mariner) Security Update for Hypertext Preprocessor (PHP) (13587)
  • 906531 Common Base Linux Mariner (CBL-Mariner) Security Update for Hypertext Preprocessor (PHP) (13587-1)
  • 906643 Common Base Linux Mariner (CBL-Mariner) Security Update for Hypertext Preprocessor (PHP) (13587-3)
  • 941313 AlmaLinux Security Update for php:8.0 (ALSA-2023:5927)
  • 941321 AlmaLinux Security Update for Hypertext Preprocessor (PHP) (ALSA-2023:5926)
  • 941553 AlmaLinux Security Update for php:8.1 (ALSA-2024:0387)
  • 961052 Rocky Linux Security Update for Hypertext Preprocessor (PHP) (RLSA-2023:5926)
  • 961062 Rocky Linux Security Update for php:8.0 (RLSA-2023:5927)
  • 961115 Rocky Linux Security Update for php:8.1 (RLSA-2024:0387)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report