Use After Free Affecting php-common package, versions <0:8.0.20-3.el9



    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.28% (68th percentile)
Expand this section
9.8 critical
Expand this section
7 high
Expand this section
Red Hat
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • published 18 Feb 2022
  • disclosed 17 Feb 2022

How to fix?

Upgrade Centos:9 php-common to version 0:8.0.20-3.el9 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream php-common package and not the php-common package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.