Name | CVE-2022-31630 |
Description | In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-5277-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
php5 (PTS) | jessie, jessie (lts) | 5.6.40+dfsg-0+deb8u21 | fixed |
php7.0 (PTS) | stretch (security) | 7.0.33-0+deb9u12 | fixed |
| stretch (lts), stretch | 7.0.33-0+deb9u19 | fixed |
php7.3 (PTS) | buster, buster (lts) | 7.3.31-1~deb10u8 | fixed |
| buster (security) | 7.3.31-1~deb10u7 | fixed |
php7.4 (PTS) | bullseye | 7.4.33-1+deb11u5 | fixed |
| bullseye (security) | 7.4.33-1+deb11u7 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
php5 | source | (unstable) | (not affected) | | | |
php7.0 | source | (unstable) | (not affected) | | | |
php7.3 | source | (unstable) | (not affected) | | | |
php7.4 | source | bullseye | 7.4.33-1+deb11u1 | | DSA-5277-1 | |
php7.4 | source | (unstable) | (unfixed) | | | |
php8.1 | source | (unstable) | 8.1.12-1 | | | |
Notes
- php7.3 <not-affected> (Vulnerable code introduced later)
Fixed in 8.1.12, 8.0.25, 7.4.33
PHP Bug: https://bugs.php.net/bug.php?id=81739
Introduced by: https://github.com/php/php-src/commit/88b603768f8e5074ad5cbdccc1e0779089fac9d0 (php-7.4.0alpha2)
Fixed by: https://github.com/php/php-src/commit/ac45ce85c8750a6fb9745093180674d029acc5bd (PHP-8.1.12)
- php5 <not-affected> (Vulnerable code introduced later)
- php7.0 <not-affected> (Vulnerable code introduced later)