Opened 4 weeks ago

Closed 4 weeks ago

#19908 closed enhancement (fixed)

php-8.3.8

Reported by: Bruce Dubbs Owned by: Douglas R. Reno
Priority: high Milestone: 12.2
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (3)

comment:1 by Douglas R. Reno, 4 weeks ago

Priority: normalhigh
Release notes:

06 Jun 2024

    CGI:
        Fixed buffer limit on Windows, replacing read call usage by _read.
        Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in 
PHP-CGI). (CVE-2024-4577)
    CLI:
        Fixed bug GH-14189 (PHP Interactive shell input state incorrectly handles quoted 
heredoc literals.).
    Core:
        Fixed bug GH-13970 (Incorrect validation of #[Attribute] flags type for non-
compile-time expressions).
    DOM:
        Fix crashes when entity declaration is removed while still having entity 
references.
        Fix references not handled correctly in C14N.
        Fix crash when calling childNodes next() when iterator is exhausted.
        Fix crash in ParentNode::append() when dealing with a fragment containing text 
nodes.
    Filter:
        Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). 
(CVE-2024-5458)
    FPM:
        Fix bug GH-14175 (Show decimal number instead of scientific notation in systemd 
status).
    Hash:
        ext/hash: Swap the checking order of `__has_builtin` and `__GNUC__` (Saki 
Takamachi)
    Intl:
        Fixed build regression on systems without C++17 compilers.
    MySQLnd:
        Fix bug GH-14255 (mysqli_fetch_assoc reports error from nested query).
    Opcache:
        Fixed bug GH-14109 (Fix accidental persisting of internal class constant in 
shm).
    OpenSSL:
        The openssl_private_decrypt function in PHP, when using PKCS1 padding 
(OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless 
it is used with an OpenSSL version that includes the changes from this pull request: 
https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These 
changes are part of OpenSSL 3.2 and have also been backported to stable versions of 
various Linux distributions, as well as to the PHP builds provided for Windows since the 
previous release. All distributors and builders should ensure that this version is used 
to prevent PHP from being vulnerable.
    Standard:
        Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585)
    XML:
        Fixed bug GH-14124 (Segmentation fault with XML extension under certain memory 
limit).
    XMLReader:
        Fixed bug GH-14183 (XMLReader::open() can't be overridden).

This brings CVE-2024-4577 (a bypass of CVE-2012-1823), CVE-2024-5458, CVE-2024-5585, and an implementation of the Marvin Attack in PHP's OpenSSL bindings. Some more information on the Marvin Attack can be found here: https://people.redhat.com/~hkario/marvin/

CVE-2024-4577 is under active exploitation.

Version 0, edited 4 weeks ago by Douglas R. Reno (next)

comment:2 by Douglas R. Reno, 4 weeks ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned

comment:3 by Douglas R. Reno, 4 weeks ago

Resolution: fixed
Status: assignedclosed

Fixed at f7aa1d4c36c2954e0afae053cf9bbdf47ceeb787

SA-12.1-057 issued

Note: See TracTickets for help on using tickets.