On 2006.10.16 20:02:05 +0200, Olivier Mueller wrote:
> On Mon, 2006-10-16 at 10:25 -0700, Dominik Zalewski wrote:
> > Hi everybody,
> > I'm running FreeBSD  6.1-RELEASE on i386. I wanted to upgrade my php to
> > latest version 4.4.4_1 cause of security update.
> > When running portupgrade php4 I got:
> > 
> > 
> > => php -- open_basedir Race Condition Vulnerability.
> >    Reference: <
> > http://www.FreeBSD.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html<http://www.freebsd.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html>
> > >
> > => Please update your ports tree and try again.
> 
> Short version: add this to your /etc/make.conf:
> 
> # PHP 4 Port installation options
> .if${.CURDIR:M*/lang/php4*}
> DISABLE_VULNERABILITIES=yes
> .endif
> 
> Long version: check in the newsgroups or mailing lists archives... :)

Only do the above if you really know what you are doing.  Just adding
code like that to make.conf which will probably be forgotten is a bad
idea.

The DISABLE_VULNERABILITIES=yes knob can just be passed directly to
make for the individual port or e.g. using the '-m DISABLE_VULNERABILITIES=yes'
as an argument to portupgrade while upgrading PHP.  This should of
cause only be done after having checked the URL from portaudit to
verify that the particular problem doesn't affect "you" (the
user/admin).

-- 
Simon L. Nielsen
_______________________________________________
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to