From owner-freebsd-questions@FreeBSD.ORG Wed Jul 16 17:58:24 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 319FA1065692 for ; Wed, 16 Jul 2008 17:58:24 +0000 (UTC) (envelope-from tethys.ocean@gmail.com) Received: from qw-out-2122.google.com (qw-out-2122.google.com [74.125.92.25]) by mx1.freebsd.org (Postfix) with ESMTP id CAACC8FC08 for ; Wed, 16 Jul 2008 17:58:23 +0000 (UTC) (envelope-from tethys.ocean@gmail.com) Received: by qw-out-2122.google.com with SMTP id 9so338113qwb.7 for ; Wed, 16 Jul 2008 10:58:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:mime-version:content-type; bh=kQ6kzYobw3j8hdrhXbEYSAf5uo6CN9PgQX+QqLZN+i0=; b=SmY6lwd3RysngBxoFLfY53Mh0GBWclQUbkVzTnEaIiGFOffNNY5xMR7wQOPRJfbngO kZHaH8TK/QofsmcWr5W3wk4D9FUAHWv/wQ+l67MqKALXEkooMpCMzM58hB9WFfSAE7J1 aZnIbamEC9sEj78OzTF9qJG3BDWxlAZPlJIxA= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type; b=D2xUn4fF9gwiKA2UtZZgkqkJ27b8KGgT0llRbL+eI9f8t9+MGM9PgYm0EztpYUzFZA 1HubckuHXSShzqBBz0x0hobjeVWoMx2vmbAXjLSIWbDJlnSi/1i8BIteVoYmoDJADoBO OyBFjbDs4b79zHKJLxL2FcWDO6hispyN7stkc= Received: by 10.142.47.13 with SMTP id u13mr197098wfu.170.1216231102607; Wed, 16 Jul 2008 10:58:22 -0700 (PDT) Received: by 10.142.141.18 with HTTP; Wed, 16 Jul 2008 10:58:22 -0700 (PDT) Message-ID: <235b80000807161058l22a97386o7e0339df034f62f4@mail.gmail.com> Date: Wed, 16 Jul 2008 20:58:22 +0300 From: "tethys ocean" To: freebsd-bugs@freebsd.org, FreeBSD_Questions MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Subject: vulnerabilities and installation options X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Jul 2008 17:58:24 -0000 Hi Today I ve installed freeBSD 7.0 to my new server than while installing packet to it, I ve met with difficulties about php5 and php5-extension. 2 days before I ve installed a web server I havent meet this error msg, this server running properly. But today I met. Verifying install for /usr/local/lib/php/20060613/posix.so in /usr/ports/sysutils/php5-posix ===> php5-posix-5.2.6 has known vulnerabilities: => php -- input validation error in posix_access function. Reference: < http://www.FreeBSD.org/ports/portaudit/ee6fa2bd-406a-11dd-936a-0015af872849.html > => Please update your ports tree and try again. *** Error code 1 Stop in /usr/ports/sysutils/php5-posix. *** Error code 1 Stop in /usr/ports/lang/php5-extensions. *** Error code 1 Stop in /usr/ports/lang/php5-extensions. I ve run portupgrade -arR but result hasnt changed I wonder 1-why today I met although this vulnerabilities is anounce in nearly May. 2-whey FreeBSD 7.0 dont give any options to user such a) this packet has a bla bla vulnerabilities do you want to continue b) or not (may be give me and pacth this vulnerabilities if it has got.) I can install with this options # make -DDISABLE_VULNERABILITIES install but I dont want since may be you have got much more better advise -- Share now a pigeon's flight Bluebound along the ancient skies, Its women forever hair and mammal, A Mediterranean town may arise If you rip apart a pigeon's heart.