Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apk/alpine/php7@7.4.33-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/php7@7.4.33-r0?arch=aarch64&distroversion=v3.15&reponame=community
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-2dg4-b7g9-eubx Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. CVE-2022-31630
VCID-ewbq-2gm8-tyf5 Buffer overflow in sponge queue functions ### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a). ### Workarounds The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether. ### References See [issue #105](https://github.com/XKCP/XKCP/issues/105) for more details. CVE-2022-37454
GHSA-6w4m-2xhg-2658

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-06T04:47:43.476896+00:00 Alpine Linux Importer Fixing VCID-ewbq-2gm8-tyf5 https://secdb.alpinelinux.org/v3.15/community.json 38.1.0
2026-04-01T19:22:38.334297+00:00 Alpine Linux Importer Fixing VCID-2dg4-b7g9-eubx https://secdb.alpinelinux.org/v3.15/community.json 38.0.0