Date: Thu, 28 Feb 2002 13:47:34 +0100 From: Dirk Froemberg <dirk@FreeBSD.org> To: Konrad Heuer <kheuer@gwdg.de> Cc: freebsd-ports@FreeBSD.org Subject: Re: PHP remote vulnerabilities Message-ID: <20020228134734.C50105@physik.TU-Berlin.DE> In-Reply-To: <20020228130151.Y12301-100000@gwdu60.gwdg.de>; from kheuer@gwdg.de on Thu, Feb 28, 2002 at 01:09:19PM %2B0100 References: <20020228130151.Y12301-100000@gwdu60.gwdg.de>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Konrad! Both mod_php3 and mod_php4 have been fixed yesterday. Regards Dirk On Thu, Feb 28, 2002 at 01:09:19PM +0100, Konrad Heuer wrote: > > Probably you already will have recognized that serious remote > vulnerabilities have been announced in different php versions yesterday: > > http://security.e-matters.de/advisories/012002.html > > Since I (still) use php3 I fetched the corresponding patch from > http://www.php.net/downloads.php which applied to the code below > /usr/ports/www/mod_php3 after make extract. I rebuilt and reinstalled the > module. > > Maybe you want to modify your FreeBSD port to include the patch > automatically? > > I didn't try to see what happens in the php4 directory. -- Dirk Froemberg FreeBSD: The Power to Serve! http://www.FreeBSD.org/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020228134734.C50105>