Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <3230301C09DEF9499B442BBE162C5E48257575E2@SESTOEX04.enea.se>
Date: Fri, 3 Oct 2014 10:28:24 +0000
From: Sona Sarmadi <sona.sarmadi@...a.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: RE: more bash parser bugs (CVE-2014-6277,
 CVE-2014-6278)


 
> So there isn't still any specific patch for CVE-2014-6277 and CVE-2014-6278
> according to your post   (http://www.openwall.com/lists/oss-
> security/2014/10/02/28)?
> 
> > * CVE-2014-6277 - uninitialized memory issue, almost certainly RCE
> > found by me. No specific patch yet.
> 
> > * CVE-2014-6278 - command injection RCE found by me. No specific patch
> yet.
> 
> But Florian's unofficial patch or its upstream version (bash43-027 & co)
> mitigates *ALL* these six so far known CVE, right?

I found some good answer here, thanks Michal :)
http://lcamtuf.blogspot.se/2014/10/bash-bug-how-we-finally-cracked.html

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.