In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3243-1 php7.3 security update
Debian DSA Debian DSA DSA-5179-1 php7.4 security update
EUVD EUVD EUVD-2022-53077 In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
Ubuntu USN Ubuntu USN USN-5479-1 PHP vulnerabilities
Ubuntu USN Ubuntu USN USN-5479-2 PHP vulnerabilities
Ubuntu USN Ubuntu USN USN-5479-3 PHP regression
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: php

Published:

Updated: 2024-09-16T18:35:01.122Z

Reserved: 2022-05-25T00:00:00

Link: CVE-2022-31625

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-16T06:15:08.623

Modified: 2024-11-21T07:04:52.873

Link: CVE-2022-31625

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-05-16T00:00:00Z

Links: CVE-2022-31625 - Bugzilla

cve-icon OpenCVE Enrichment

No data.