From owner-freebsd-ports Thu Feb 28 3:54:34 2002 Delivered-To: freebsd-ports@freebsd.org Received: from mile.nevermind.kiev.ua (freebsddiary.org.ua [213.186.199.26]) by hub.freebsd.org (Postfix) with ESMTP id AC28B37B400 for ; Thu, 28 Feb 2002 03:54:29 -0800 (PST) Received: (from never@localhost) by mile.nevermind.kiev.ua (8.11.6/8.11.4) id g1SBsFU23997; Thu, 28 Feb 2002 13:54:15 +0200 (EET) (envelope-from never) Date: Thu, 28 Feb 2002 13:54:14 +0200 From: Nevermind To: Thomas Hurst Cc: freebsd-ports@FreeBSD.ORG Subject: Re: PHP 4.1.1 security bug Message-ID: <20020228115414.GA23874@nevermind.kiev.ua> References: <20020227192316.GA819@voi.aagh.net> Mime-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: <20020227192316.GA819@voi.aagh.net> User-Agent: Mutt/1.3.26i Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Hello, Thomas Hurst! On Wed, Feb 27, 2002 at 07:23:16PM +0000, you wrote: > > Ref: http://www.php.net > > http://security.e-matters.de/advisories/012002.html > > Setting file_uploads = Off in php.ini will prevent the offending > function being called. Upgrading port to 4.1.2 will fix vulnerability :) -- NEVE-RIPE To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message