all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
From: Leo Famulari <leo@famulari.name>
To: "Ludovic Courtès" <ludo@gnu.org>
Cc: guix-devel@gnu.org
Subject: Re: CVE-2016-0634 code execution in Bash prompt when expanding hostname
Date: Tue, 27 Sep 2016 17:26:18 -0400	[thread overview]
Message-ID: <20160927212618.GA1117@jasmine> (raw)
In-Reply-To: <87d1jxi7jc.fsf@gnu.org>

On Thu, Sep 22, 2016 at 12:42:15AM +0900, Ludovic Courtès wrote:
> John Darrington <john@darrington.wattle.id.au> skribis:
> 
> > On Tue, Sep 20, 2016 at 04:55:30PM -0400, Leo Famulari wrote:
> >      Any advice on how we should handle CVE-2016-0634?
> >      
> >      http://seclists.org/oss-sec/2016/q3/534
> >
> > Like the comment there says, it is only a problem if the machine has
> > already been owned,
> 
> … or if a privilege application like a DHCP client can be made to set
> the host name to $(something bad), which was apparently possible at some
> point.
> 
> > so I don't see what the issue is.  If there is an issue it is for the
> > bash maintainers to patch.

Perhaps it's not the most critical bug, but I don't think we can
effectively anticipate the full impact of this (or any) bug. It's better
to just fix it now that we know about it.

> Chet proposed a patch:
> 
>   http://seclists.org/oss-sec/2016/q3/att-538/prompt-string-comsub.patch

I've asked Chet if he will add the patch to the bash-4.3-patches FTP
directory. If not, we can apply it the "normal" way.

> 
> IIUC, the just-released 4.4 isn’t affected, right?

Right.

> We should at least update it in core-updates, but core-updates won’t be
> merged until we have fixed that Binutils/MIPS issue (which shouldn’t be
> too hard, but we never know!).

I spent some time looking at the Bash package definition, but I'm stuck
on how to handle all the Bash %patch-series machinery. There are
currently no patches for Bash 4.4, nor is there an FTP directory
corresponding to a future patch series.

Does anyone have advice on how to proceed?

  reply	other threads:[~2016-09-27 21:26 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-09-20 20:55 CVE-2016-0634 code execution in Bash prompt when expanding hostname Leo Famulari
2016-09-21  5:20 ` John Darrington
2016-09-21 15:42   ` Ludovic Courtès
2016-09-27 21:26     ` Leo Famulari [this message]
2016-09-30 16:17       ` Bash 4.4 upgrade Ludovic Courtès
2016-09-30 17:27         ` Leo Famulari
2016-09-30 22:04           ` Ludovic Courtès

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20160927212618.GA1117@jasmine \
    --to=leo@famulari.name \
    --cc=guix-devel@gnu.org \
    --cc=ludo@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.