From ${URL} : Buffer over-write vulnerability in finfo_open triggered by malformed magic file was found, causing segfault when running with environment variable USE_ZEND_ALLOC set to 0, and also when compiled with ASAN with USE_ZEND_ALLOC set and unset. This issue was fixed in file-5.23. Upstream bug (contains reproducer): http://bugs.gw.com/view.php?id=522 PHP bug: https://bugs.php.net/bug.php?id=71527 @maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
stabilizing file-5.25 should be fine
@arches, please stabilize: =sys-apps/file-5.25
ia64/sparc...
sparc stable
This issue was resolved and addressed in GLSA 201701-42 at https://security.gentoo.org/glsa/201701-42 by GLSA coordinator Aaron Bauman (b-man).
Reopened for ia64 stable then cleanup.
ia64 stable. Maintainer(s), please cleanup.
commit 0d0ddd19f8af195c7ec4e60a4db7ca3dba756c2f Author: Lars Wendler <polynomial-c@gentoo.org> Date: Tue Jan 17 16:17:02 2017 sys-apps/file: Removed old. Package-Manager: Portage-2.3.3, Repoman-2.3.1