[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALASPHP8.0-2023-004 --- php

ID: oval:org.secpod.oval:def:1701622Date: (C)2023-09-19   (M)2024-04-17
Class: PATCHFamily: unix




In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using imageloadfont function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface

Platform:
Amazon Linux 2
Product:
php
Reference:
ALASPHP8.0-2023-004
CVE-2022-31630
CVE-2022-37454
CVE    2
CVE-2022-31630
CVE-2022-37454
CPE    2
cpe:/a:php:php
cpe:/o:amazon:linux:2

© SecPod Technologies