From ${URL} : Use after free in 'opcache' component of PHP Bug report: https://bugs.php.net/bug.php?id=68677&edit=2 Commit fix: http://git.php.net/?p=php-src.git;a=commit;h=777c39f4042327eac4b63c7ee87dc1c7a09a3115 Uninitalized Pointer Read in PHP core('fopen()') Bug report: https://bugs.php.net/bug.php?id=68692&edit=2 Commit fix: http://git.php.net/?p=php-src.git;a=commit;h=7ebdc8d70d7617f2c3353b027663ef54a24a2248 Uninitalized Pointer Read in PHP core Bug report: https://bugs.php.net/bug.php?id=68694&edit=2 Commit fix: http://git.php.net/?p=php-src.git;a=commit;h=f3ea1b0b6a42a08093bf9191ad76fb4b5e0a653b Null Pointer Deference in pgsql Bug report: https://bugs.php.net/bug.php?id=68741&edit=2 Commit fix: http://git.php.net/?p=php-src.git;a=commit;h=124fb22a13fafa3648e4e15b4f207c7096d8155e Null Pointer Deference in ereg(regex) Bug report: https://bugs.php.net/bug.php?id=68740&edit=2 Commit fix: http://git.php.net/?p=php-src.git;a=commit;h=124fb22a13fafa3648e4e15b4f207c7096d8155e @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
@maintainers: should the opcache and fopen issues be backported to current versions? Based on a quick glance at the code the issues seems to still affect 5.5.22 at least (from what I can see the other issues were determined to be invalid as security fixes based on ${URL} thread)
Maintainer(s) does the current version going through stabilization contain a fix for this? Stabilization versions: 5.4.38,5.5.22,5.6.6 as part of Bug 541098?
Per the CVE: "Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors." Added to existing GLSA.
This issue was resolved and addressed in GLSA 201606-10 at https://security.gentoo.org/glsa/201606-10 by GLSA coordinator Kristian Fiskerstrand (K_F).