From ${URL} : Description A vulnerability has been reported in PHP, which can be exploited by malicious people to potentially cause a DoS (Denial of Service). The vulnerability is caused due to an error in the libmagic library bundled in the Fileinfo extension when processing certain files and can be exploited to trigger infinite recursion and cause a crash via a specially crafted file. The vulnerability is reported in versions 5.5.9 and prior and 5.4.25 and prior. Solution: Fixed in the source code repository. Provided and/or discovered by: Originally reported by Bernd Melchers against File via the File mailing list. Original Advisory: Bernd Melchers: http://mx.gw.com/pipermail/file/2014/001327.html PHP: https://github.com/php/php-src/commit/89f864c547014646e71862df3664e3ff33d7143d https://github.com/php/php-src/commit/fdb9b6e5ec73d37b9734c9f7c50b3946ed85b5e3 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Fixed in 5.5.10 and 5.4.26, which should now be in the tree. You can goahead with stabilisation if necessary.
Arches, please test and mark stable: =dev-lang/php-5.4.26 =dev-lang/php-5.5.10 Target Keywords : "alpha amd64 arm hppa ia64 ppc ppc64 spark x86"
Stable for HPPA.
amd64 stable
x86 stable
sparc stable
arm stable
ppc stable
ia64 stable
alpha stable
ppc64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Arches, Thank you for your work Maintainer(s), please drop the vulnerable version. Added to existing GLSA Request
Maintainer(s), Thank you for cleanup!
This issue was resolved and addressed in GLSA 201408-11 at http://security.gentoo.org/glsa/glsa-201408-11.xml by GLSA coordinator Kristian Fiskerstrand (K_F).