[php-maint] Re: php4 security issues, the complete works (vol 2)

Moritz Muehlenhoff jmm at inutil.org
Mon Sep 11 17:22:29 UTC 2006


sean finney wrote:
> yes, i agree.  i'll make sure to have some notes in the next uploads
> of php4/php5 about this.  joey/moritz:  i imagine that i should get you
> guys to sign off on whatever that blurb says... how about:

Thanks.
 
> 	Because of the large number of security-related problems with 
> 	certain PHP configurations, the Debian security team does not
> 	provide security support for configurations known to be 
> 	inherently insecure.  Most specifically, the security team will
> 	not provide support for flaws in:
> 	- vulnerabilities involving register_globals being activated, 
> 	  unless specifically the vulnerability activates this setting 
> 	  when it was configured as deactivated.
> 	- vulnerabilities involving any kind of safe_mode or 
> 	  open_basedir violation, as these are security models flawed
> 	  by design and no longer have upstream support either.
> 	- any "works as expected" vulnerabilities, such as "user can 
> 	  cause php to crash by writing a malcious php script", unless
> 	  such vulnerabilities involve some kind of higher-level DoS or
> 	  privilege escalation that would not otherwise be available.
> 	- something else?  something more specific about input 
> 	  sanitizing problems?

That looks nice, but it should also be pointed out that it's not a 
question of a lack of resources, but of providing a sane solution;
PHP is not designed to bypass every possible flaw an incompetent web
developer could make. I guess you as a native speaker could formulate
that a little bit more positive :-)

I guess we should also point out that most of the issues above are adressed
the way PHP 6 will handle them (no more open_basedir, register_globals,
safe mode, etc.).

Cheers,
        Moritz



More information about the pkg-php-maint mailing list