From nobody@FreeBSD.org  Thu Jan  6 08:39:16 2011
Return-Path: <nobody@FreeBSD.org>
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
	by hub.freebsd.org (Postfix) with ESMTP id 9383C106566C
	for <freebsd-gnats-submit@FreeBSD.org>; Thu,  6 Jan 2011 08:39:16 +0000 (UTC)
	(envelope-from nobody@FreeBSD.org)
Received: from red.freebsd.org (unknown [IPv6:2001:4f8:fff6::22])
	by mx1.freebsd.org (Postfix) with ESMTP id 847B68FC08
	for <freebsd-gnats-submit@FreeBSD.org>; Thu,  6 Jan 2011 08:39:16 +0000 (UTC)
Received: from red.freebsd.org (localhost [127.0.0.1])
	by red.freebsd.org (8.14.4/8.14.4) with ESMTP id p068dGhj098148
	for <freebsd-gnats-submit@FreeBSD.org>; Thu, 6 Jan 2011 08:39:16 GMT
	(envelope-from nobody@red.freebsd.org)
Received: (from nobody@localhost)
	by red.freebsd.org (8.14.4/8.14.4/Submit) id p068dG3i098126;
	Thu, 6 Jan 2011 08:39:16 GMT
	(envelope-from nobody)
Message-Id: <201101060839.p068dG3i098126@red.freebsd.org>
Date: Thu, 6 Jan 2011 08:39:16 GMT
From: Chris Tandiono <christandiono@tbp.berkeley.edu>
To: freebsd-gnats-submit@FreeBSD.org
Subject: lang/php5 is vulnerable
X-Send-Pr-Version: www-3.1
X-GNATS-Notify:

>Number:         153719
>Category:       ports
>Synopsis:       lang/php5 is vulnerable
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    ale
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Jan 06 08:40:09 UTC 2011
>Closed-Date:    Sun Jan 09 12:54:53 UTC 2011
>Last-Modified:  Sun Jan 09 12:54:53 UTC 2011
>Originator:     Chris Tandiono
>Release:        8.0-RELEASE-p3
>Organization:
>Environment:
FreeBSD host.local 8.0-RELEASE-p3 FreeBSD 8.0-RELEASE-p3 #0: Wed May 26 05:45:12 UTC 2010     root@i386-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  i386

>Description:
lang/php5 5.3.4 is vulnerable to a DoS attack involving floating point numbers (when compiled with the default CFLAGS).
>How-To-Repeat:
Compile php5 from ports without specifying SSE math instructions. The produced 387 instructions will cause PHP to infinite loop on certain floating point numbers.
>Fix:
Arch Linux has a "PHP 5.3.5" but AFAICT it's not been released yet. One workaround is to enable SSE instructions at compile-time.

>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: freebsd-ports-bugs->ale 
Responsible-Changed-By: edwin 
Responsible-Changed-When: Thu Jan 6 08:40:14 UTC 2011 
Responsible-Changed-Why:  
Over to maintainer (via the GNATS Auto Assign Tool) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=153719 

From: Michael Scheidell <michael.scheidell@secnap.com>
To: <bug-followup@FreeBSD.org>, <christandiono@tbp.berkeley.edu>
Cc:  
Subject: Re: ports/153719: lang/php5 is vulnerable
Date: Fri, 7 Jan 2011 17:04:51 -0500

 --------------010102040409060705080909
 Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
 Content-Transfer-Encoding: 7bit
 
 php 5.3.5 is release and fixes the 5.3* branch.
 php 5.2.17 is also released and fixes the php52 (5.2* branch)
 
 
 <http://www.php.net/archive/2011.php#id2011-01-06-1>
 
 and ports maintainers: I suggest upgrading this to a higher priority on 
 x32 machines.
 x64 boxes are not vulnerable, but x32 is.
 <http://www.php.net/distributions/test_bug53632.txt>
 
 
 -- 
 Michael Scheidell, CTO
 o: 561-999-5000
 d: 561-948-2259
 ISN: 1259*1300
  >*| *SECNAP Network Security Corporation
 
     * Certified SNORT Integrator
     * 2008-9 Hot Company Award Winner, World Executive Alliance
     * Five-Star Partner Program 2009, VARBusiness
     * Best in Email Security,2010: Network Products Guide
     * King of Spam Filters, SC Magazine 2008
 
 
 ______________________________________________________________________
 This email has been scanned and certified safe by SpammerTrap(r). 
 For Information please see http://www.secnap.com/products/spammertrap/
 ______________________________________________________________________  
 --------------010102040409060705080909
 Content-Type: text/html; charset="ISO-8859-1"
 Content-Transfer-Encoding: 7bit
 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
 <html>
   <head>
 
     <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
   </head>
   <body bgcolor="#ffffff" text="#000000">
     php 5.3.5 is release and fixes the 5.3* branch.<br>
     php 5.2.17 is also released and fixes the php52 (5.2* branch)<br>
     <br>
     <br>
     <a class="moz-txt-link-rfc2396E" href="http://www.php.net/archive/2011.php#id2011-01-06-1">&lt;http://www.php.net/archive/2011.php#id2011-01-06-1&gt;</a><br>
     <br>
     and ports maintainers: I suggest upgrading this to a higher priority
     on x32 machines.<br>
     x64 boxes are not vulnerable, but x32 is.<br>
     <a class="moz-txt-link-rfc2396E" href="http://www.php.net/distributions/test_bug53632.txt">&lt;http://www.php.net/distributions/test_bug53632.txt&gt;</a><br>
     <br>
     <br>
     <div class="moz-signature">-- <br>
       Michael Scheidell, CTO<br>
       o: 561-999-5000<br>
       d: 561-948-2259<br>
       ISN: 1259*1300<br>
       <font color="#999999">&gt;</font><font color="#cc0000"> <b>| </b></font>SECNAP
       Network Security Corporation
       <style type="text/css">
 <!--
 .unnamed1 {
 	margin: 1em;
 	padding: 1px;
 } -->
 </style>
       <ul class="unnamed1">
         <li>Certified SNORT Integrator</li>
         <li>2008-9 Hot Company Award Winner, World Executive Alliance</li>
         <li>Five-Star Partner Program 2009, VARBusiness</li>
         <li>Best in Email Security,2010: Network Products Guide</li>
         <li>King of Spam Filters, SC Magazine 2008</li>
       </ul>
     </div>
   
 <br>
 <div id="disclaimer.secnap.com"><hr />
 <p>This email has been scanned and certified safe by SpammerTrap&reg;.
 <br />For Information please see
 <a href="http://www.secnap.com/products/spammertrap/">http://www.secnap.com/products/spammertrap/</a></p> <hr /></div>
 <br>
 </body>
 </html>
 
 --------------010102040409060705080909--
State-Changed-From-To: open->closed 
State-Changed-By: ale 
State-Changed-When: Sun Jan 9 12:54:34 UTC 2011 
State-Changed-Why:  
Updated, thanks. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=153719 
>Unformatted:
