Skip to content

Commit 557e09f

Browse files
ramseyericmann
andcommitted
Update NEWS
Co-authored-by: Eric Mann <ericmann@php.net>
1 parent 7e0e3cc commit 557e09f

File tree

1 file changed

+22
-2
lines changed

1 file changed

+22
-2
lines changed

NEWS

+22-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,28 @@
11
PHP NEWS
22
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3-
?? ??? ????, PHP 8.1.29
3+
06 Jun 2024, PHP 8.1.29
44

5+
- CGI:
6+
. Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection
7+
in PHP-CGI). (CVE-2024-4577) (nielsdos)
58

9+
- Filter:
10+
. Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL).
11+
(CVE-2024-5458) (nielsdos)
12+
13+
- OpenSSL:
14+
. The openssl_private_decrypt function in PHP, when using PKCS1 padding
15+
(OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack
16+
unless it is used with an OpenSSL version that includes the changes from this pull
17+
request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection).
18+
These changes are part of OpenSSL 3.2 and have also been backported to stable
19+
versions of various Linux distributions, as well as to the PHP builds provided for
20+
Windows since the previous release. All distributors and builders should ensure that
21+
this version is used to prevent PHP from being vulnerable. (CVE-2024-2408)
22+
23+
- Standard:
24+
. Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874).
25+
(CVE-2024-5585) (nielsdos)
626

727
11 Apr 2024, PHP 8.1.28
828

@@ -31,7 +51,7 @@ PHP NEWS
3151
- FPM:
3252
. Fixed bug GH-12705 (Segmentation fault in fpm_status_export_to_zval).
3353
(Patrick Prasse)
34-
54+
3555
- Intl:
3656
. Fixed bug GH-12635 (Test bug69398.phpt fails with ICU 74.1). (nielsdos)
3757

0 commit comments

Comments
 (0)