Name | CVE-2024-27355 |
Description | An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. When processing the ASN.1 object identifier of a certificate, a sub identifier may be provided that leads to a denial of service (CPU consumption for decodeOID). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3749-1, DLA-3750-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
php-phpseclib (PTS) | stretch (lts), stretch | 2.0.30-2~deb9u1 | vulnerable |
| buster | 2.0.14-1 | vulnerable |
| buster (security) | 2.0.30-2~deb10u3 | fixed |
| bullseye (security), bullseye | 2.0.30-2+deb11u1 | vulnerable |
| bookworm (security), bookworm | 2.0.42-1+deb12u1 | vulnerable |
| trixie, sid | 2.0.47-1 | fixed |
php-phpseclib3 (PTS) | bookworm (security), bookworm | 3.0.19-1+deb12u2 | vulnerable |
| trixie, sid | 3.0.37-1 | fixed |
phpseclib (PTS) | jessie | 0.3.8-1 | vulnerable |
| stretch (lts), stretch | 1.0.19-1~deb9u2 | vulnerable |
| buster | 1.0.14-1 | vulnerable |
| buster (security) | 1.0.19-3~deb10u3 | fixed |
| bullseye (security), bullseye | 1.0.19-3+deb11u1 | vulnerable |
| bookworm (security), bookworm | 1.0.20-1+deb12u1 | vulnerable |
| trixie, sid | 1.0.23-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - phpseclib <no-dsa> (Minor issue; can be fixed via pu)
[bullseye] - phpseclib <no-dsa> (Minor issue; can be fixed via pu)
[bookworm] - php-phpseclib <no-dsa> (Minor issue; can be fixed via pu)
[bullseye] - php-phpseclib <no-dsa> (Minor issue; can be fixed via pu)
[bookworm] - php-phpseclib3 <no-dsa> (Minor issue; can be fixed via pu)
https://github.com/phpseclib/phpseclib/commit/e32531001b4d62c66c3d824ccef54ffad835eb59
[stretch] - php-phpseclib <postponed> (Minor issue; CPU DoS)
[stretch] - phpseclib <postponed> (Minor issue; CPU DoS)