Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 26 Dec 2009 06:48:08 -0500
From:      Jerry <gesbbb@yahoo.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: portaudit php vulnerabilities
Message-ID:  <20091226064808.2dfecb06@scorpio.seibercom.net>
In-Reply-To: <560f92640912252345g64038989y3fba4043ef5ffba6@mail.gmail.com>
References:  <9fa4f0760912252118q3397f90fr8891873eab0447d5@mail.gmail.com> <560f92640912252345g64038989y3fba4043ef5ffba6@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 25 Dec 2009 23:45:39 -0800
Nerius Landys <nlandys@gmail.com> replied:

>> For the past week or so, portaudit has been warning me that the
>> installed version of php on my system (php5-5.2.11_1) has known
>> vulnerabilties. Fair enough. However, I've not seen a fix in the
>> ports tree since then. Is my only option to deinstall php until this
>> gets fixed?
>
>Hi.  I've been experiencing the same problem.  Apparently 5.2.12 is
>not in the ports yet, but probably will be soon.
>
>If found it necessary to do some port-related commands even though
>5.2.11 is currently blacklisted by portaudit.  You can use
>DISABLE_VULNERABILITIES in your commands as outlined here until there
>is an updated port:

Same problem here. I was going to update to FreeBSD-8 this weekend;
however, I thought better of it. As sure as death and taxes, I know
that as soon as I install FBSD-8 with PHP the new version of PHP will
become available. I'll install it and something will break. I'll just
wait until this problem is resolved.

-- 
Jerry
gesbbb@yahoo.com

|::::=======
|::::=======
|===========
|===========
|

Genuine happiness is when a wife sees a double chin on her husband's
old girl friend.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091226064808.2dfecb06>