If a password stored with password_hash starts with a null byte (\x00), testing a blank string as the password via password_verify will incorrectly return true. If a user were able to create a password with a leading null byte (unlikely, but syntactically valid), an attacker could trivially compromise the victim's account by attempting to sign in with a blank string.
Created php tracking bugs for this issue: Affects: fedora-all [bug 2275062]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10952 https://access.redhat.com/errata/RHSA-2024:10952
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:10950 https://access.redhat.com/errata/RHSA-2024:10950
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:10949 https://access.redhat.com/errata/RHSA-2024:10949
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10951 https://access.redhat.com/errata/RHSA-2024:10951
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7315 https://access.redhat.com/errata/RHSA-2025:7315