On 26 September 2014 13:37, Ferenc Kovacs <tyr...@gmail.com> wrote:

>
>
> On Fri, Sep 26, 2014 at 12:59 PM, Peter Lind <peter.e.l...@gmail.com>
> wrote:
>
>> On 26 September 2014 12:48, Andrea Faulds <a...@ajf.me> wrote:
>>
>> >
>> > On 26 Sep 2014, at 11:46, marius adrian popa <map...@gmail.com> wrote:
>> >
>> > > Maybe we need an official stance about shellshock
>> >
>> > Do we? As I understand it, this isn’t a PHP-level vulnerability, and I’m
>> > not sure there’s much we can reasonably do about it. Similarly to the
>> > Heartbleed bug, control is not in our hands here.
>> >
>> >
>> Informing people about the cases where they *might* be at risk when
>> running
>> PHP doesn't seem a bad idea. Even though PHP itself is not at fault.
>>
>>
> I think we should only communicate when we have something definite to say,
> and currently our official stance is that we aren't aware any problems
> related to shellshock, but that doesn't mean that there is none, so I'm not
> sure that we have something definite to say.
> If we do end up finding something affecting significant amount of users
> (even if that requires some misconfiguration or lousy fastcgi wrapper) we
> could make an announcement.
>
>

I think it's worth communicating what Redhat is:
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

As a PHP dev I'd love to be able to find information like that on php.net,
not having to figure out from other sources if it pertains to me or not.



-- 
<hype>
WWW: plphp.dk / plind.dk
CV: careers.stackoverflow.com/peterlind
LinkedIn: plind
Twitter: kafe15
</hype>

Reply via email to