{"id":"USN-5530-1","summary":"php8.1 vulnerability","details":"It was discovered that PHP incorrectly handled certain memory operations\nwhen obtaining file information. A remote attacker could use this issue to\ncause PHP to crash, resulting in a denial of service, or possibly execute\narbitrary code.\n","modified":"2026-02-10T04:42:42Z","published":"2022-07-25T11:22:22Z","related":["UBUNTU-CVE-2022-31627"],"upstream":["CVE-2022-31627","UBUNTU-CVE-2022-31627"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5530-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-31627"}],"affected":[{"package":{"name":"php8.1","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/php8.1@8.1.2-1ubuntu2.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.1.2-1ubuntu2.2"}]}],"versions":["8.1.0~rc4-1ubuntu2","8.1.0-1","8.1.2-1ubuntu1","8.1.2-1ubuntu2","8.1.2-1ubuntu2.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libapache2-mod-php7.4","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"libapache2-mod-php8.0","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"libapache2-mod-php8.1","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"libphp8.1-embed","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-bcmath","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-bz2","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-cgi","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-cli","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-common","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-curl","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-dba","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-dev","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-enchant","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-fpm","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-gd","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-gmp","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-imap","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-interbase","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-intl","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-ldap","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-mbstring","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-mysql","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-odbc","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-opcache","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-pgsql","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-phpdbg","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-pspell","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-readline","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-snmp","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-soap","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-sqlite3","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-sybase","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-tidy","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-xml","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-xsl","binary_version":"8.1.2-1ubuntu2.2"},{"binary_name":"php8.1-zip","binary_version":"8.1.2-1ubuntu2.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5530-1.json","cves_map":{"cves":[{"id":"CVE-2022-31627","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}