Nicolas Boullis wrote:
Hi,
Moritz Muehlenhoff wrote:
------------------------------------------------------------------------
Debian Security Advisory DSA-1550-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
April 17, 2008 http://www.debian.org/security/faq
------------------------------------------------------------------------
Package : suphp
Vulnerability : programming error
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2008-1614
Debian Bug : 475431
It was discovered that suphp, an Apache module to run PHP scripts with
owner permissions handles symlinks insecurely, which may lead to
privilege escalation by local users.
I upgraded the package as suggested, but it broke my setup.
For what it's worth, I have a virtualhost whose documentroot is
/var/www/foo.
That directory is owned by user foo.
Under this one, I have a directory /var/www/foo/bar, that contains a
script index.php, both being owned by user bar.
(This web site is composed of several branches, managed by different
people.)
With the new suphp, apache refuses to serve /var/www/foo/bar/index.php
because /var/www/foo is not owned by the script's owner.
Looking at the diff between 0.6.2-1 and 0.6.2-1+etch0, it looks like the
new suPHP::Application::checkParentDirectories function is responsible
for this new behaviour.
Since, my setup involves no symlink at all, I think this check exceeds
what is required to fix the security flaw.
Would it be possible to fix this behaviour?
Cheers,
Nicolas Boullis
Try apache2-mpm-itk. Is better than suphp IMHO !
--
Best regards,
Adrian Minta
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]