I did quick security testing on latest stable version of nas4free and found PHP 5.3.13 on 9.1.0.1 - Sandstorm (revision 457) is vulnerable to mutiple security issue including Integer over follow, brute force attack on crypt function etc.
See http://www.php.net/ChangeLog-5.php#5.3.15. Please upgrade it to latest PHP > 5.3.15.
This is the old XigmaNAS forum in read only mode,
it will taken offline by the end of march 2021!
I like to aks Users and Admins to rewrite/take over important post from here into the new fresh main forum!
Its not possible for us to export from here and import it to the main forum!
it will taken offline by the end of march 2021!
I like to aks Users and Admins to rewrite/take over important post from here into the new fresh main forum!
Its not possible for us to export from here and import it to the main forum!
[DONE] Upgrade PHP 5.3.13 Med-High risk security issues
-
pi3ch
- NewUser

- Posts: 6
- Joined: 20 Nov 2012 17:18
- Status: Offline
- zoon01
- Developer

- Posts: 724
- Joined: 20 Jun 2012 21:06
- Location: Netherlands
- Contact:
- Status: Offline
Re: Upgrade PHP 5.3.13 due to Med-High risk security issues
NAS4Free 9.1.0.1.457 use PHP 5.4.8 (Current stable) version of php.
Revision 385 - Directory Listing
Modified Wed Oct 24 19:27:50 2012 UTC (3 weeks, 5 days ago) by zoon01
Upgrade php to 5.4.8.
As you could see, from rev. 385 and up the latest version is in use
I don't know what tools for test you use but it seems it give false positive on this one.
regards,
zoon01
Revision 385 - Directory Listing
Modified Wed Oct 24 19:27:50 2012 UTC (3 weeks, 5 days ago) by zoon01
Upgrade php to 5.4.8.
As you could see, from rev. 385 and up the latest version is in use
I don't know what tools for test you use but it seems it give false positive on this one.
regards,
zoon01
System specs: XigmaNAS 11.2.0.4 -embedded on Samsung 860 EVO 256GB and Supermicro X10SL7-F w / Bios v3.2, IPMI v.03.86 / CPU E3-1241 v3 @ 3.50GHz - 32GB Crucial DDR3L 1600mhz ECC 1.35v , LSI 2308 on PH20.00.07.00 IT mode, Storage: 5x Western Digital Red (WD30EFRX) raidz
Development system is same system in virtualbox.
Development system is same system in virtualbox.
-
pi3ch
- NewUser

- Posts: 6
- Joined: 20 Nov 2012 17:18
- Status: Offline
Re: Upgrade PHP 5.3.13 due to Med-High risk security issues
$ uname -r
9.1-RC3
$ php -v
PHP 5.3.13 (cgi-fcgi) (built: May 9 2012 23:44:42)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.3.0, Copyright (c) 1998-2012 Zend Technologies
$ php-cgi -v
PHP 5.4.8 (cgi-fcgi) (built: Nov 13 2012 04:38:42)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.4.0, Copyright (c) 1998-2012 Zend Technologies
9.1-RC3
$ php -v
PHP 5.3.13 (cgi-fcgi) (built: May 9 2012 23:44:42)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.3.0, Copyright (c) 1998-2012 Zend Technologies
$ php-cgi -v
PHP 5.4.8 (cgi-fcgi) (built: Nov 13 2012 04:38:42)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.4.0, Copyright (c) 1998-2012 Zend Technologies
- daoyama
- Developer

- Posts: 394
- Joined: 25 Aug 2012 09:28
- Location: Japan
- Status: Offline
Re: Upgrade PHP 5.3.13 due to Med-High risk security issues
Probably, you install as full before, then upgrade to 457?pi3ch wrote:$ uname -r
9.1-RC3
$ php -v
PHP 5.3.13 (cgi-fcgi) (built: May 9 2012 23:44:42)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.3.0, Copyright (c) 1998-2012 Zend Technologies
$ php-cgi -v
PHP 5.4.8 (cgi-fcgi) (built: Nov 13 2012 04:38:42)
Copyright (c) 1997-2012 The PHP Group
Zend Engine v2.4.0, Copyright (c) 1998-2012 Zend Technologies
(Or you install 3rd-party packages.)
php is nerver used for both WebGUI, Web service in NAS4Free 9.1.0.1.457.
Always use php-cgi for WebGUI and Web service.
If you don't need php, you can delete it.
Daisuke Aoyama
NAS4Free 10.2.0.2.2115 (x64-embedded), 10.2.0.2.2258 (arm), 10.2.0.2.2258(dom0)
GIGABYTE 5YASV-RH, Celeron E3400 (Dual 2.6GHz), ECC 8GB, Intel ET/CT/82566DM (on-board), ZFS mirror (2TBx2)
ASRock E350M1/USB3, 16GB, Realtek 8111E (on-board), ZFS mirror (2TBx2)
MSI MS-9666, Core i7-860(Quad 2.8GHz/HT), 32GB, Mellanox ConnectX-2 EN/Intel 82578DM (on-board), ZFS mirror (3TBx2+L2ARC/ZIL:SSD128GB)
Develop/test environment:
VirtualBox 512MB VM, ESXi 512MB-8GB VM, Raspberry Pi, Pi2, ODROID-C1
GIGABYTE 5YASV-RH, Celeron E3400 (Dual 2.6GHz), ECC 8GB, Intel ET/CT/82566DM (on-board), ZFS mirror (2TBx2)
ASRock E350M1/USB3, 16GB, Realtek 8111E (on-board), ZFS mirror (2TBx2)
MSI MS-9666, Core i7-860(Quad 2.8GHz/HT), 32GB, Mellanox ConnectX-2 EN/Intel 82578DM (on-board), ZFS mirror (3TBx2+L2ARC/ZIL:SSD128GB)
Develop/test environment:
VirtualBox 512MB VM, ESXi 512MB-8GB VM, Raspberry Pi, Pi2, ODROID-C1
-
pi3ch
- NewUser

- Posts: 6
- Joined: 20 Nov 2012 17:18
- Status: Offline
Re: Upgrade PHP 5.3.13 due to Med-High risk security issues
Yep I have upgraded my full-install from 9.0.0.1 due to this security issue, but then found even after upgrade php is still old version. I haven't installed any other packages other than python.
so apprenly upgrading from 9.0.0.1 to 9.1.0.1 the php package (/usr/local/bin/php) doesnt not get the latest version.
so apprenly upgrading from 9.0.0.1 to 9.1.0.1 the php package (/usr/local/bin/php) doesnt not get the latest version.
-
pi3ch
- NewUser

- Posts: 6
- Joined: 20 Nov 2012 17:18
- Status: Offline
Re: Upgrade PHP 5.3.13 due to Med-High risk security issues
Please include the for the upgrade script OR let users who come from 9.0.0.1 know about the outdated packages. There is a potential that other packages might also not get the latest version.
- daoyama
- Developer

- Posts: 394
- Joined: 25 Aug 2012 09:28
- Location: Japan
- Status: Offline
Re: Upgrade PHP 5.3.13 due to Med-High risk security issues
Old files should be removed if you upgrade, but I forgot to add php to the listpi3ch wrote:Please include the for the upgrade script OR let users who come from 9.0.0.1 know about the outdated packages. There is a potential that other packages might also not get the latest version.
This was fixed at 509. So, you can't see the php binary if upgrade to 509 or later.
Thanks,
Daisuke Aoyama
NAS4Free 10.2.0.2.2115 (x64-embedded), 10.2.0.2.2258 (arm), 10.2.0.2.2258(dom0)
GIGABYTE 5YASV-RH, Celeron E3400 (Dual 2.6GHz), ECC 8GB, Intel ET/CT/82566DM (on-board), ZFS mirror (2TBx2)
ASRock E350M1/USB3, 16GB, Realtek 8111E (on-board), ZFS mirror (2TBx2)
MSI MS-9666, Core i7-860(Quad 2.8GHz/HT), 32GB, Mellanox ConnectX-2 EN/Intel 82578DM (on-board), ZFS mirror (3TBx2+L2ARC/ZIL:SSD128GB)
Develop/test environment:
VirtualBox 512MB VM, ESXi 512MB-8GB VM, Raspberry Pi, Pi2, ODROID-C1
GIGABYTE 5YASV-RH, Celeron E3400 (Dual 2.6GHz), ECC 8GB, Intel ET/CT/82566DM (on-board), ZFS mirror (2TBx2)
ASRock E350M1/USB3, 16GB, Realtek 8111E (on-board), ZFS mirror (2TBx2)
MSI MS-9666, Core i7-860(Quad 2.8GHz/HT), 32GB, Mellanox ConnectX-2 EN/Intel 82578DM (on-board), ZFS mirror (3TBx2+L2ARC/ZIL:SSD128GB)
Develop/test environment:
VirtualBox 512MB VM, ESXi 512MB-8GB VM, Raspberry Pi, Pi2, ODROID-C1
-
pi3ch
- NewUser

- Posts: 6
- Joined: 20 Nov 2012 17:18
- Status: Offline
Re: Upgrade PHP 5.3.13 due to Med-High risk security issues
Cool, will upgrade.