Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/php7.4@7.4.33-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/php7.4@7.4.33-1%2Bdeb11u1?distro=bullseye
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-11jg-tu1t-abh6 Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. CVE-2022-31629
VCID-2dg4-b7g9-eubx Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. CVE-2022-31630
VCID-b3v5-hed2-wqeb Multiple vulnerabilities have been found in PHP, the worst of which could result in arbitrary code execution. CVE-2022-31628
VCID-ewbq-2gm8-tyf5 Buffer overflow in sponge queue functions ### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a). ### Workarounds The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether. ### References See [issue #105](https://github.com/XKCP/XKCP/issues/105) for more details. CVE-2022-37454
GHSA-6w4m-2xhg-2658

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:45:18.819972+00:00 Debian Importer Fixing VCID-11jg-tu1t-abh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:07.815428+00:00 Debian Importer Fixing VCID-b3v5-hed2-wqeb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:11.043843+00:00 Debian Importer Fixing VCID-2dg4-b7g9-eubx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:52.268012+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:00:53.798464+00:00 Debian Importer Fixing VCID-11jg-tu1t-abh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:21.034471+00:00 Debian Importer Fixing VCID-b3v5-hed2-wqeb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:45.390077+00:00 Debian Importer Fixing VCID-2dg4-b7g9-eubx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:50.317116+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:49:42.197378+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:42.155370+00:00 Debian Importer Fixing VCID-2dg4-b7g9-eubx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:42.135068+00:00 Debian Importer Fixing VCID-11jg-tu1t-abh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:49:42.114805+00:00 Debian Importer Fixing VCID-b3v5-hed2-wqeb https://security-tracker.debian.org/tracker/data/json 38.1.0