First published: Mon Jun 06 2022(Updated: )
Fixed bug : mysqlnd/pdo password buffer overflow. (CVE-2022-31626)
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
<8.0.20 | 8.0.20 | |
PHP PHP | >=7.4.0<7.4.30 | |
PHP PHP | >=8.0.0<8.0.20 | |
PHP PHP | >=8.1.0<8.1.7 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/php7.3 | <=7.3.31-1~deb10u1 | 7.3.31-1~deb10u5 |
debian/php7.4 | 7.4.33-1+deb11u4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31626 is a vulnerability in PHP that allows a buffer overflow when using the pdo_mysql extension with the mysqlnd driver and allowing a third party to supply the host and password for the connection.
CVE-2022-31626 affects PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7.
CVE-2022-31626 has a severity value of 8.8, which is considered high.
To fix CVE-2022-31626, upgrade PHP to version 7.4.30, 8.0.20, or 8.1.7.
You can find more information about CVE-2022-31626 on the official PHP bug report (https://bugs.php.net/bug.php?id=81719) and the Debian and Fedora project announcements (https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html, https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3T4MMEEZYYAEHPQMZDFN44PHORJWJFZQ/).