Description
In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3243-1 | php7.3 security update |
Debian DSA |
DSA-5179-1 | php7.4 security update |
EUVD |
EUVD-2022-53077 | In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service. |
Ubuntu USN |
USN-5479-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5479-2 | PHP vulnerabilities |
Ubuntu USN |
USN-5479-3 | PHP regression |
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-16T18:35:01.122Z
Reserved: 2022-05-25T00:00:00.000Z
Link: CVE-2022-31625
No data.
Status : Modified
Published: 2022-06-16T06:15:08.623
Modified: 2024-11-21T07:04:52.873
Link: CVE-2022-31625
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN