Date: Sun, 15 Oct 2006 19:49:55 +0200 From: Thomas <freebsdlists@bsdunix.ch> To: Jonathan Horne <freebsd@dfwlp.com> Cc: freebsd-questions@freebsd.org Subject: Re: PHP new vulnarabilities Message-ID: <453274C3.7090409@bsdunix.ch> In-Reply-To: <200610151239.12127.freebsd@dfwlp.com> References: <45322A1D.8070204@hadara.ps> <20061015151215.15a4062e@loki.starkstrom.lan> <200610151239.12127.freebsd@dfwlp.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Jonathan Jonathan Horne schrieb: > On Sunday 15 October 2006 08:12, Joerg Pernfuss wrote: >> On Sun, 15 Oct 2006 14:31:25 +0200 >> >> "Khaled J. Hussein" <khaled@hadara.ps> wrote: >>> hi all >>> >>> last time i found this when i run portaudit -Fda >>> >>> Affected package: php5-5.1.6 >>> Type of problem: php -- _ecalloc Integer Overflow Vulnerability. >>> Reference: >>> <http://www.FreeBSD.org/ports/portaudit/e329550b-54f7-11db-a5ae-00508d6a6 >>> 2df.html> >>> >>> how can i fix this >> update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc >> overflow, but not yet the open_basedir race condition. >> >> Joerg > > ive been scratching my head on this one for a few days too. i have a box at > home, that is running 6.2-PRERELEASE. when i try to install the lang/php5 > port, i get: > > [root@athena /usr/ports/lang/php5]# make install clean > ===> php5-5.1.6_1 has known vulnerabilities: > => php -- open_basedir Race Condition Vulnerability. > Reference: > <http://www.FreeBSD.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html> > => Please update your ports tree and try again. > *** Error code 1 > > Stop in /usr/ports/lang/php5. > > however, my server is running the same port, with no issue whatsoever. > > [root@zeus /etc/mail]# pkg_info | grep php5 > php5-5.1.6_1 > (and many extensions too) > > perplexing that one box could have it, while another one (using the same > updated ports tree), refuses it. could be related to the code branch im > following on my workstaion versus my server? Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You can use: make -DDISABLE_VULNERABILITIES install clean It will ignore the vuxml entry. Cheers, Thomas
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?453274C3.7090409>