In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3243-1 | php7.3 security update |
Debian DSA |
DSA-5179-1 | php7.4 security update |
EUVD |
EUVD-2022-53077 | In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service. |
Ubuntu USN |
USN-5479-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5479-2 | PHP vulnerabilities |
Ubuntu USN |
USN-5479-3 | PHP regression |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-16T18:35:01.122Z
Reserved: 2022-05-25T00:00:00
Link: CVE-2022-31625
No data.
Status : Modified
Published: 2022-06-16T06:15:08.623
Modified: 2024-11-21T07:04:52.873
Link: CVE-2022-31625
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN