-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Just got 35 failures against 5.4.4-14+deb7u12 #5
Comments
It doesn't handle patched versions for distros yet - that's something that a lot of people have been asking for. I'm looking into how to track these updates for the distros to see if it's possible before I do much work on it. |
ya I was gonna ask how this helps at all with an LTS distro release like REL or Ubuntu LTS versions which pin the PHP version: REL7php -r "echo PHP_VERSION;" Ubuntu 14.04 LTSphp -r "echo PHP_VERSION;" These will always return the same major/minor numbers although security patches will have been applied by the distribution updates. Silly to run any production webapp on a non-LTS linux distribution. |
Yeah, I'm looking for good data sources where I can see what bugs were fixed in which released. Haven't had too much time to devote to it yet, so if anyone knows of any, that'd be great. |
@enygma For the ubuntu distributions, we could parse So, using 5.5.9-1ubuntu4.4, we would:
Then we could extend this to RH, Debian and any other distribution with LTS support done in this way. It will be a pain to setup and maintain the scrappers (especially if something changes on the sites) and we'll probably need to rely on some eyeballs spotting mistakes (changelogs aren't always 100% reliable). An alternative is to checkout the source code from launchpad and see when certain patches are added to the build process like this:
|
Hmm, I'm good with writing the tools to run those updates. I can find a place to run them from every so often and try for an update to the file....crossing fingers for no merge conflicts? :) |
@enygma, I've put a prototype up here https://github.com/xsist10/versionscan/tree/ubuntu-releases if you care to give it a look. Test like so:
|
Added the ubuntu scrapper to the gist with the check scrapper: https://gist.github.com/xsist10/f623f03634c73a8ad0ac |
I think we may need to build a list of patch masks. I've come across the following already:
The last was on an Ubuntu box with what looked like a manual merge in from Debian to ensure the latest release of PHP. A comprehensive list will help us safe guard against missing any. |
Sorry about the delay. Here are the Debian patches. Just need to put together the redhat versions. Give it a test here: https://github.com/xsist10/versionscan/tree/ubuntu-releases
|
Added Redhat versions. I'll clean up the scrapers so anyone can update the files.
|
Pull request #7 |
Gist has been updated with Debian and Redhat scrappers (warning, they could take a couple of runs to finish if Kimono decides to block your requests after too many). |
Notice, on RHEL/Fedora/CentOS, PHP_VERSION is upstream version, doesn't provide any useful information about patch
|
About redhat, package version is also not relevant (I mean, version compare is not relevant), as various branches are maintained (5.11, 6.4, 6.5, 6.6, 7.0, 7.1...) So, for example, you can have
|
What does $ php --version return? Same response or a more useful tag?
|
|
Here is a small script to get CVEs fixed on a RHEL package.
Output:
Of course, this should be considered with base version (5.4.16 here), I mean some can be old (due to nature of changelog), but if they appear in the list, they are fixed, if not, should check PHP_VERSION Notice, this also work for SCL base packages (RHEL 6 provides 5.3.3, 5.4.16 and 5.5.6, package name can be, php-cli, php54-php-cli, php55-php-cli, ...)
|
We could definitely include that for systems that detect the If someone does use the |
Does it correctly validate PHP vulnerabilities with Debian patches?
The text was updated successfully, but these errors were encountered: