Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 15 Oct 2006 15:12:15 +0200
From:      Joerg Pernfuss <elessar@bsdforen.de>
To:        freebsd-questions@freebsd.org
Subject:   Re: PHP new vulnarabilities
Message-ID:  <20061015151215.15a4062e@loki.starkstrom.lan>
In-Reply-To: <45322A1D.8070204@hadara.ps>
References:  <45322A1D.8070204@hadara.ps>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Sun, 15 Oct 2006 14:31:25 +0200
"Khaled J. Hussein" <khaled@hadara.ps> wrote:

> hi all
> 
> last time i found this when i run portaudit -Fda
> 
> Affected package: php5-5.1.6
> Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
> Reference:
> <http://www.FreeBSD.org/ports/portaudit/e329550b-54f7-11db-a5ae-00508d6a62df.html>;
> 
> how can i fix this

update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc
overflow, but not yet the open_basedir race condition.

	Joerg
-- 
| /"\   ASCII ribbon   |  GnuPG Key ID | e86d b753 3deb e749 6c3a |
| \ / campaign against |    0xbbcaad24 | 5706 1f7d 6cfd bbca ad24 |
|  X    HTML in email  |        .the next sentence is true.       |
| / \     and news     |     .the previous sentence was a lie.    |

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFFMjOwH31s/bvKrSQRAl+cAJ9MR1Bm1nrcB2dzSlexJiinyqZCBwCfffiq
qEFio0+FWeHxKCA0rM5rTSA=
=l65e
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20061015151215.15a4062e>