Kohana 3.2.3 and earlier and 3.3.x through 3.3.2 make it easier for remote attackers to spoof session cookies and consequently conduct PHP object injection attacks by leveraging use of standard string comparison operators to compare cryptographic hashes. References: http://seclists.org/fulldisclosure/2014/May/54 Upstream patch: https://github.com/kohana/core/commit/66b409a6da2960130888989534ff1799532b8f32
Created php-Kohana tracking bugs for this issue: Affects: epel-6 [bug 1487598] Affects: fedora-all [bug 1487599]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.