The upstream advisory describes this issue as follows:
A memory-related vulnerability in PHP's filter handling system, particularly when processing input with convert.quoted-printable-decode filters, leads to a segmentation fault. This vulnerability is triggered through specific sequences of input data, causing PHP to crash. When exploited, it allows an attacker to extract a single byte of data from the heap or cause a DoS.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Php8.1 Extra | php | 2025-02-12 23:07 | ALAS2PHP8.1-2025-006 |
Amazon Linux 2 - Php8.2 Extra | php | 2025-02-12 23:07 | ALAS2PHP8.2-2025-006 |
Amazon Linux 2023 | php8.1 | 2025-02-12 22:57 | ALAS2023-2025-845 |
Amazon Linux 2023 | php8.2 | 2025-02-26 23:14 | ALAS2023-2025-872 |
Amazon Linux 2023 | php8.3 | 2025-02-26 23:14 | ALAS2023-2025-873 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
NVD | CVSSv3 | 8.2 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |