From owner-freebsd-ports@FreeBSD.ORG Thu Oct 5 07:53:05 2006 Return-Path: X-Original-To: ports@freebsd.org Delivered-To: freebsd-ports@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 87E7316A415 for ; Thu, 5 Oct 2006 07:53:05 +0000 (UTC) (envelope-from infofarmer@gmail.com) Received: from py-out-1112.google.com (py-out-1112.google.com [64.233.166.177]) by mx1.FreeBSD.org (Postfix) with ESMTP id D740C43D4C for ; Thu, 5 Oct 2006 07:53:04 +0000 (GMT) (envelope-from infofarmer@gmail.com) Received: by py-out-1112.google.com with SMTP id o67so593330pye for ; Thu, 05 Oct 2006 00:53:04 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:sender:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition:x-google-sender-auth; b=jDtFU2soc6y46fmxtg1tM7xUPo408QS7Gthn+QfUSoNdlwdiPEklIFRXdH8dvT4Ik1Op2jHNtvdEt7/XNmddjgVxxoXoXMh10oG3/ElAxhL7WarSo+9Q7Y+r2V0H2wZ3KeleIlw0Lstcn62PwYupGJnmW+k8fRrCmuE/Vmnz3jA= Received: by 10.35.113.12 with SMTP id q12mr3027954pym; Thu, 05 Oct 2006 00:53:04 -0700 (PDT) Received: by 10.35.119.12 with HTTP; Thu, 5 Oct 2006 00:53:04 -0700 (PDT) Message-ID: Date: Thu, 5 Oct 2006 11:53:04 +0400 From: "Andrew Pantyukhin" Sender: infofarmer@gmail.com To: "Alex Dupre" , "FreeBSD Ports" MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline X-Google-Sender-Auth: 16978601f77fcefe Cc: Subject: PHP Vulnerabilities and Suhosin X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Oct 2006 07:53:05 -0000 This latest advisory makes php4/php5 vulnerable: http://www.vuxml.org/freebsd/edabe438-542f-11db-a5ae-00508d6a62df.html http://www.hardened-php.net/advisory_082006.132.html I've noticed we have WITH_SUHOSIN option. It may alleviate some security issues. In particular, suhosin 0.9.6 fixes this latest issue. Can we somehow make this option influence PKGNAME (suffix, prefix, version or revision) so I can mark php+suhosin 0.9.6 safe in VuXML? Thanks!