Stefan Teleman wrote:

(snip...)

I believe we should also Purify PHP. The problem is that Purify probably won't work on Nevada, but we could build PHP on a release of S10 they support, and it will still catch buffer overflows, ABR/ABW, UMR, stack corruption, double deletion, etc. We could then publish the results of the Coverity audit and of the Purify output, and we could forward them to php-security.org, along with patches. This would give the PHP community an objective base for requesting bug and security fixes.


While Nevada may not run Purify, it is possible to get a subset of this with umem debugging, which is in nevada and as Open Source has been ported to Linux by an ISV. This sounds like an excellent thing to get going under the new OpenSolaris project! The upstream projects can take it into their codebases as well if they'd like to do so.

Speaking of which, we haven't been set up yet, have we?

It may also be interesting to see what, if anything, can be done about reducing privilege sets for this OpenSolaris Apache/PHP stack to at least reduce the possibility of nefarious activities if (when?) there is a vulnerability. My colleague Alec Muffet may be able to lend some thoughts there.

- Matt

--
Matt Ingenthron - Web Infrastructure Solutions Architect
Sun Microsystems, Inc. - Client Solutions, Systems Practice
http://blogs.sun.com/mingenthron/
email: [EMAIL PROTECTED]             Phone: 310-242-6439



_______________________________________________
opensolaris-discuss mailing list
[email protected]

Reply via email to