Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5424359E.9060606@case.edu>
Date: Thu, 25 Sep 2014 11:32:46 -0400
From: Chet Ramey <chet.ramey@...e.edu>
To: Solar Designer <solar@...nwall.com>
CC: chet.ramey@...e.edu, oss-security@...ts.openwall.com
Subject: Re: CVE-2014-6271: remote code execution through bash

On 9/24/14, 6:27 PM, Solar Designer wrote:
> On Wed, Sep 24, 2014 at 12:08:46PM -0400, Chet Ramey wrote:
>> On 9/24/14, 11:16 AM, Solar Designer wrote:
>>
>>> I see no good workaround. 
>>
>> You're correct; there is not a good workaround.  Since there are publicly
>> available patches for all bash versions back 15 years or so, though, the
>> best path forward is to apply those as quickly as possible.
> 
> Thank You for providing those patches!  It is rare for an upstream
> author to provide security fix backports going this far back, and it is
> really helpful in this case.

Thanks for the kind words.  In this spirit, I've attached a patch for
bash-2.05b, since I've been told that there are still systems running it
out there.

Chet


-- 
``The lyf so short, the craft so long to lerne.'' - Chaucer
		 ``Ars longa, vita brevis'' - Hippocrates
Chet Ramey, ITS, CWRU    chet@...e.edu    http://cnswww.cns.cwru.edu/~chet/

Download attachment "funcdef-import-2.05b.patch" of type "application/x-patch" (2472 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.