|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesCVE-2022-37454.patch (last revision 2023-01-02 09:16 UTC by psbhagwat at avaya dot com)CVE-2022-37454 (last revision 2022-10-11 18:24 UTC by nicky at mouha dot be) Pull Requests
Pull requests:
HistoryAllCommentsChangesGit/SVN commits
[2022-10-11 18:32 UTC] stas@php.net
-Summary: Buffer overflow (CVE-2022-37454)
+Summary: buffer overflow in hash_update() on long parameter
[2022-10-11 18:41 UTC] stas@php.net
[2022-10-11 18:42 UTC] ondrej@php.net
[2022-10-11 18:55 UTC] stas@php.net
[2022-10-11 19:44 UTC] nicky at mouha dot be
[2022-10-20 12:45 UTC] nicky at mouha dot be
[2022-10-21 01:25 UTC] stas@php.net
-CVE-ID:
+CVE-ID: 2022-37454
[2022-10-21 06:06 UTC] git@php.net
[2022-10-21 06:06 UTC] git@php.net
-Status: Open
+Status: Closed
[2023-01-02 09:16 UTC] psbhagwat at avaya dot com
[2023-01-02 09:16 UTC] psbhagwat at avaya dot com
[2023-05-11 15:54 UTC] cesar_delarosa at bhd dot com dot do
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Fri Oct 24 07:00:01 2025 UTC |
Description: ------------ I would like to inform you of a buffer overflow vulnerability in PHP. The authors of the upstream repository have a proposed fix, and would like to coordinate a reasonable timeline for public disclosure. Thanks for confirming receipt of this message, and for establishing a reasonable timeframe for remediation. Looking forward to your reply! Test script: --------------- <?php $ctx = hash_init("sha3-224"); hash_update($ctx, str_repeat("\x00", 1)); hash_update($ctx, str_repeat("\x00", 4294967295)); echo hash_final($ctx); ?> Expected result: ---------------- c5bcc3bc73b5ef45e91d2d7c70b64f196fac08eee4e4acf6e6571ebe Actual result: -------------- Segmentation fault