Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Sep 2014 11:51:38 -0500
From:      Bryan Drewery <bdrewery@FreeBSD.org>
To:        Bartek Rutkowski <robak@freebsd.org>
Cc:        freebsd-security <freebsd-security@freebsd.org>, freebsd-ports <freebsd-ports@freebsd.org>
Subject:   Re: bash velnerability
Message-ID:  <5425999A.3070405@FreeBSD.org>
In-Reply-To: <CAHcXP%2Bdx2etYgQPNiAxk2P68Z-4j%2BbTvdMoHfz%2BxKsBDKh9Z9g@mail.gmail.com>
References:  <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com>	<00000148ab969845-5940abcc-bb88-4111-8f7f-8671b0d0300b-000000@us-west-2.amazonses.com>	<54243F0F.6070904@FreeBSD.org>	<54244982.8010002@FreeBSD.org>	<16EB2C50-FBBA-4797-83B0-FB340A737238@circl.lu>	<542596E3.3070707@FreeBSD.org> <CAHcXP%2Bdx2etYgQPNiAxk2P68Z-4j%2BbTvdMoHfz%2BxKsBDKh9Z9g@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--va42hkwdeprlC58M2DtxTtuMo0MD5Dhxs
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

On 9/26/2014 11:46 AM, Bartek Rutkowski wrote:
> On Fri, Sep 26, 2014 at 6:40 PM, Bryan Drewery <bdrewery@freebsd.org> w=
rote:
>> On 9/26/2014 2:36 AM, Steve Clement wrote:
>>> Dear all,
>>>
>>> In case you urgently need to go the manual route, here is one way to =
really patch your systems:
>>>
>>> https://www.circl.lu/pub/tr-27/
>>>
>>> Until the patch is in the bash upstream=E2=80=A6 (which it might be b=
y now)
>>>
>>> Take care,
>>>
>>
>> The port has had the fixes since yesterday. The packages are building.=

>>
>> --
>> Regards,
>> Bryan Drewery
>>
>=20
> Apparently, the full fix is still not delivered, accordingly to this:
> http://seclists.org/oss-sec/2014/q3/741
>=20
> Kind regards,
> Bartek Rutkowski
>=20

I'm pretty sure they call that a "feature". This is a bit different.
This is modifying the command used to call a function as the feature
intends. The vulnerability was that just parsing the environment would
execute the code.

TL;DR; You should cleanse your environment and only accept valid input
to work around this feature. The bash developer (Chet) said he would not
remove it by default, at least a few days ago.

--=20
Regards,
Bryan Drewery


--va42hkwdeprlC58M2DtxTtuMo0MD5Dhxs
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)

iQEcBAEBAgAGBQJUJZmaAAoJEDXXcbtuRpfPQUEIANGtu3zTUyewl5OETRpraWdD
c7WlFWEFH4/KZ6f5BtuD6ozE4RIiTEJRnoKSczOJo11ZBVajD9cjRXO46ujpCqth
ZRAtUXsTak8RwuDOdTwV4EUhUdCwGgXBNBfPAiVwmNYShMyREsmnSsHaIiE6+9XU
4r/ZIEymp8aDY8nTvVhpWvfm/qs1Y80YIepqto+HR1PJAXinR10Bxek2JOJtQOFW
LCJObtSC4KntsNl5m/zJ7AyaNRysvUSTvukH/PnO9ArH4e4/ehlTyjh0DnjGcxtW
jUuYEbbO9D/QWxNseM1rLKCHcgVcH0U/+lRlqJiFUSgSQIKbNS/Ru4W91NGmFR0=
=MHTp
-----END PGP SIGNATURE-----

--va42hkwdeprlC58M2DtxTtuMo0MD5Dhxs--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5425999A.3070405>