From owner-freebsd-questions@FreeBSD.ORG Fri Oct 13 17:20:01 2006 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id A224716A4D0 for ; Fri, 13 Oct 2006 17:20:01 +0000 (UTC) (envelope-from SRS0=XLeGJYK0=D2=asarian-host.net=admin@asarian-host.net) Received: from mail.asarian-host.net (mail.asarian-host.net [194.109.160.70]) by mx1.FreeBSD.org (Postfix) with ESMTP id D5B6B43D45 for ; Fri, 13 Oct 2006 17:20:00 +0000 (GMT) (envelope-from SRS0=XLeGJYK0=D2=asarian-host.net=admin@asarian-host.net) Received: from anonymizer.asarian-host.net (localhost [127.0.0.1]) (authenticated bits=0) by mail.asarian-host.net (8.13.8/8.13.8) with ESMTP id k9DHJxje010550 for ; Fri, 13 Oct 2006 19:19:59 +0200 (CEST) (envelope-from admin@asarian-host.net) From: Mark Received-SPF: pass (asarian-host.net: 127.0.0.1 is authenticated by a trusted mechanism) receiver=anonymizer.asarian-host.net; client-ip=127.0.0.1; envelope-from=; helo=clientrunner.asarian-host.net; Message-Id: <200610131719.k9DHJwvO010540@asarian-host.net> Date: Fri, 13 Oct 2006 17:19:59 GMT X-Authenticated-Sender: admin@asarian-host.net X-Trace: KfSfFhk5UxFENsQ0VFxI8C7G2PXds2g/JZbDoMWmw9COJ5qJjNjz1ETWM+yJYURW X-Complaints-To: abuse@asarian-host.net X-Abuse-Info: Please be sure to forward a copy of ALL headers, otherwise we are unable to process your complaint Organization: Asarian-host To: "'FreeBSD-Questions Questions'" MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2962 X-Auth: Asarian-host PGP signature iQEVAwUARS/KvzFqW1BleBN9AQEybwgAmR3OiW11/dBcMlvkP0phruRHktyA2Lr1 2QRfUDk0Y6vUcaL0esNSZq5FeSKeDoN3yxy0tB/To2bLzYamrVnAFx4vVzVA9mEy /IR1XVllcURn0j/zbbiADu1YGVG8v2Rys/6LDKd/uebViQlHtJiSBE7YCndz0GAQ peICNhbo7mgLymSL3bqGccYVIt2OREjf1AFcvUV5jmsnmPeAQuo9S6XpFutsbUh5 H7/NIOszvile4wsRih5gM4f1zlR1aMZu9xCaXPROX7XbMVPBIg4F3EXPbdym7n0D 4YxaBzP5bCWYoTPd7r9PvhpLJB3JO9qDepzdBHY4RenlqR8fk2rw1Q== =2/Fj Subject: "ini_restore" patch for php4.4.4? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Oct 2006 17:20:01 -0000 While I'm upgrading stuff anyway, at cvsweb.cgi, I see not "ini_restore" patch in files/ yet for this php4.4.4 exploit. As described in: http://securityreason.com/achievement_securityalert/42 Or is this done internally yet? Thanks, - Mark