Bugzilla – Bug 1226074
VUL-0: CVE-2024-5585: php5,php53,php7,php72,php74,php8: bypass of CVE-2024-1874
Last modified: 2024-06-07 07:50:18 UTC
From: Alan Coopersmith <alan.coopersmith () oracle com> Date: Thu, 6 Jun 2024 17:04:53 -0700 In https://fosstodon.org/@php/112570710411472992 it is written: The Changelog link includes further details: - Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577) - Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458) - Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585) - The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable. Unfortunately the related advisories don't seem to be published yet under those GHSA id's on https://github.com/php/php-src/security . -- -Alan Coopersmith- alan.coopersmith () oracle com Oracle Solaris Engineering - https://blogs.oracle.com/solaris References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-5585 https://seclists.org/oss-sec/2024/q2/273
CVE-2024-1874 ( 1222856 ) is a windows issue so we are not affected. Closing.