|
Message-ID: <20140924163242.GF16787@gremlin.ru> Date: Wed, 24 Sep 2014 20:32:42 +0400 From: gremlin@...mlin.ru To: oss-security@...ts.openwall.com Subject: Re: CVE-2014-6271: remote code execution through bash On 24-Sep-2014 22:01:50 +0600, Alexander E. Patrakov wrote: >> I see no good workaround. Starting the forced command with >> "unset >SSH_ORIGINAL_COMMAND &&" does not help - we'd need >> to unset the variable before starting bash, not from bash. > Won't installing dash and setting the shell of users who have > forced commands to dash mitigate this somehow? Possibly, that will require making /bin/sh symlink to point at dash (or zsh, or whatever) as well... -- Alexey V. Vissarionov aka Gremlin from Kremlin <gremlin ПРИ gremlin ТЧК ru> GPG: 8832FE9FA791F7968AC96E4E909DAC45EF3B1FA8 @ hkp://keys.gnupg.net
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.