OpenSUSE Leap 15.4 | SUSE LE 15 SP4: new php7 packages (). OpenSUSE Leap 15.3-15.4 | SUSE LE 15 SP2-SP3: new php7 packages (). Solutions for this threat PHP: version 8.1.12.įixed versions are indicated in information sources. The trust level is of type confirmed by the editor, with an origin of document.Īn attacker with a expert ability can exploit this threat bulletin. Our Vigilance Vulnerability Alerts team determined that the severity of this vulnerability announce is medium. This weakness impacts software or systems such as Debian, Fedora, HP-UX, openSUSE Leap, Oracle Communications, Solaris, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu. However, it tries to read a memory area located outside the expected range, which triggers a fatal error, or leads to the disclosure of a memory fragment.Īn attacker can therefore force a read at an invalid memory address of PHP, via imageloadfont, in order to trigger a denial of service, or to obtain sensitive information.įull bulletin, software filtering, emails, fixes. The PHP product allocates memory for its internal processing. Severity of this computer vulnerability: 2/4. Impacted software: Debian, Fedora, HP-UX, openSUSE Leap, Oracle Communications, Solaris, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu. Vulnerability of PHP: out-of-bounds memory reading via imageloadfont Synthesis of the vulnerabilityĪn attacker can force a read at an invalid memory address of PHP, via imageloadfont, in order to trigger a denial of service, or to obtain sensitive information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |