http://git.php.net/?p=php-src.git;a=commit;h=13f1c276ab72cf1a8a400fd013b9289d0018a340 This commit fixes a NULL Pointer Dereference Vulnerability. Reference: https://bugs.php.net/bug.php?id=68545
5.20 released fixing this issue: http://php.net/ChangeLog-5.php#5.5.20
Bumped. Stabilise if necessary.
Changing description to multiple vulnerabilities to also cover CVE-2014-8142: "Fixed bug #68594 (Use after free vulnerability in unserialize())(CVE-2014-8142)." described for the same updates
Arches, please stabilize: =dev-lang/php-5.5.20 Stable targets: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 =dev-lang/php-5.4.36 Stable targets: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Stable for HPPA.
amd64 stable
x86 stable
alpha stable
arm stable
ppc stable
ppc64 stable
ia64 stable
sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
CVE-2014-8142 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8142): Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
Arches, Thank you for your work Maintainer(s), please drop the vulnerable version(s). New GLSA Request filed.
CVE-2014-9427 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9427): sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
Maintainer(s), it has been 30 days since request for cleanup. Please drop the vulnerable versions.
Cleanup would be done in bug #533998
This issue was resolved and addressed in GLSA 201503-03 at http://security.gentoo.org/glsa/glsa-201503-03.xml by GLSA coordinator Kristian Fiskerstrand (K_F).