FS#42109 - [bash] CVE-2014-7169, remote code execution; follow up to CVE-2014-6271
Attached to Project:
Arch Linux
Opened by Doug Newgard (Scimmia) - Thursday, 25 September 2014, 03:18 GMT
Last edited by Felix Yan (felixonmars) - Friday, 26 September 2014, 03:53 GMT
Opened by Doug Newgard (Scimmia) - Thursday, 25 September 2014, 03:18 GMT
Last edited by Felix Yan (felixonmars) - Friday, 26 September 2014, 03:53 GMT
|
Details
Discovered by RedHat:
https://bugzilla.redhat.com/show_bug.cgi?id=1146319
|
This task depends upon
Closed by Felix Yan (felixonmars)
Friday, 26 September 2014, 03:53 GMT
Reason for closing: Fixed
Additional comments about closing: 4.3.026-1
Friday, 26 September 2014, 03:53 GMT
Reason for closing: Fixed
Additional comments about closing: 4.3.026-1
[0] https://bugzilla.novell.com/attachment.cgi?id=606672&action=edit
[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/
looks like debian's security team resolved this CVE by applying a non-upstream patch from Chet Ramey [0].
Additionally they applied fixes [1] for two out-of-bounds array accesses [2] (which do not yet have a CVE assigned)
[0] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762760#16
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762760#51
[2] http://www.openwall.com/lists/oss-security/2014/09/25/32