FS#42109 - [bash] CVE-2014-7169, remote code execution; follow up to CVE-2014-6271
            Attached to Project:
            Arch Linux
            
Opened by Doug Newgard (Scimmia) - Thursday, 25 September 2014, 03:18 GMT
Last edited by Felix Yan (felixonmars) - Friday, 26 September 2014, 03:53 GMT
          Opened by Doug Newgard (Scimmia) - Thursday, 25 September 2014, 03:18 GMT
Last edited by Felix Yan (felixonmars) - Friday, 26 September 2014, 03:53 GMT
| 
 | Details
                    Discovered by RedHat:
                      https://bugzilla.redhat.com/show_bug.cgi?id=1146319
                   | 
              This task depends upon
              
              
            
            
          
            Closed by  Felix Yan (felixonmars)
Friday, 26 September 2014, 03:53 GMT
Reason for closing: Fixed
Additional comments about closing: 4.3.026-1
          
        Friday, 26 September 2014, 03:53 GMT
Reason for closing: Fixed
Additional comments about closing: 4.3.026-1
 
                      
[0] https://bugzilla.novell.com/attachment.cgi?id=606672&action=edit
[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/
looks like debian's security team resolved this CVE by applying a non-upstream patch from Chet Ramey [0].
Additionally they applied fixes [1] for two out-of-bounds array accesses [2] (which do not yet have a CVE assigned)
[0] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762760#16
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762760#51
[2] http://www.openwall.com/lists/oss-security/2014/09/25/32