Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2006 20:02:05 +0200
From:      Olivier Mueller <om-lists-bsd@omx.ch>
To:        Dominik Zalewski <kobazik@gmail.com>
Cc:        freebsd-stable@freebsd.org
Subject:   Re: php4 update
Message-ID:  <1161021725.15873.7.camel@bigapple.omnis.ch>
In-Reply-To: <4762624a0610161025n5524140jb063e551a189fd80@mail.gmail.com>
References:  <4762624a0610161025n5524140jb063e551a189fd80@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 2006-10-16 at 10:25 -0700, Dominik Zalewski wrote:
> Hi everybody,
> I'm running FreeBSD  6.1-RELEASE on i386. I wanted to upgrade my php to
> latest version 4.4.4_1 cause of security update.
> When running portupgrade php4 I got:
> 
> 
> => php -- open_basedir Race Condition Vulnerability.
>    Reference: <
> http://www.FreeBSD.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html<http://www.freebsd.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html>;
> >
> => Please update your ports tree and try again.

Short version: add this to your /etc/make.conf:

# PHP 4 Port installation options
.if${.CURDIR:M*/lang/php4*}
DISABLE_VULNERABILITIES=yes
.endif


Long version: check in the newsgroups or mailing lists archives... :)

HTH,
Olivier




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1161021725.15873.7.camel>