Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2022-31630

Published: 31 October 2022

In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information.

Notes

AuthorNote
sbeattie
PEAR issues should go against php-pear as of xenial
leosilva
introduced by 88b603768f8e5074ad5cbdccc1e0779089fac9d0
in php7.40.alpha2.
Priority

Medium

CVSS 3 base score: 7.1

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

trusty Not vulnerable

upstream Needs triage

xenial Does not exist

php7.0
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy Does not exist

kinetic Does not exist

trusty Does not exist

upstream Needs triage

xenial Not vulnerable

php7.2
Launchpad, Ubuntu, Debian
bionic Not vulnerable

focal Does not exist

jammy Does not exist

kinetic Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

php7.4
Launchpad, Ubuntu, Debian
bionic Does not exist

focal
Released (7.4.3-4ubuntu2.15)
jammy Does not exist

kinetic Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

php8.1
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

jammy
Released (8.1.2-1ubuntu2.8)
kinetic
Released (8.1.7-1ubuntu3.1)
trusty Does not exist

upstream Needs triage

xenial Does not exist