As with other users of OpenSSL vulnerable to the Marvin Attack, the issue is caused by improper use of the RSA decryption APIs provided by OpenSSL. Upstream doesn't plan to introduce any code changes, but instead document that the API is unsafe to use unless it's used with OpenSSL that implements implicit rejection (we have already shipped those fixes in RHEL 8, 9, and in Fedora). References: https://people.redhat.com/~hkario/marvin/ https://github.com/openssl/openssl/pull/13817 https://www.php.net/manual/en/function.openssl-private-decrypt.php
This issue is now public: https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864
Created php tracking bugs for this issue: Affects: fedora-all [bug 2291133]