|
Message-ID: <5422F1AB.9080604@redhat.com> Date: Wed, 24 Sep 2014 18:30:35 +0200 From: Florian Weimer <fweimer@...hat.com> To: oss-security@...ts.openwall.com CC: chet.ramey@...e.edu Subject: Re: CVE-2014-6271: remote code execution through bash On 09/24/2014 06:23 PM, Michal Zalewski wrote: > Note that on Linux systems where /bin/sh is symlinked to /bin/bash, > any popen() / system() calls from within languages such as PHP would > be of concern due to the ability to control HTTP_* in the env. This depends on how PHP is invoked. mod_php does not set the CGI environment variables. However, it is true that if CGI programs spawn subprocesses, they may be affected even if the CGI program itself is not written in bash. -- Florian Weimer / Red Hat Product Security
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.