![]() |
Regarding older versions of Slackware and Bash
@rouvas
http://slackware.osuosl.org/slackwar...source/a/bash/ You can download the Slackbuild from here. Chet Ramey actually has provided patches for Bash all the way back to version 2.05b. Update the patches directory in the Slackbuild with the latest patches from here: http://ftp.gnu.org/gnu/bash/bash-3.1-patches/ http://ftp.gnu.org/gnu/bash/ Build, install ... Done. |
Quote:
Code:
29,34d28 |
Quote:
Code:
patching file parse.y patches. I thought others here might also. You are, of course, welcome to disregard my recommendation. --mancha |
http://www.itnews.com.au/News/396256...effective.aspx
No patches yet? ;) Something to ponder: http://paste.lisp.org/display/143864 Is this all bash's fault? Or is it the fault of Apache and DHCP allowing bad data being passed on into bash? The following was copied from http://paste.lisp.org/display/143864, in case it gets deleted: Quote:
|
The itnews guy seem to have woke up this morning thinking it's saturday...
|
|
From article quoted above:
Quote:
The grammar production allowed when bash reads in function definitions given in environment variable values should have been {function_body}. Period. Not the full grammar used when you type a command at a prompt or when commands are read from a script. It is as much a feature to run shell commands while bash reads its environment as it would be a feature for my toilet to give me an impromptu shower each morning. The point that other programs along the vectors may share blame I'll accept. |
One question: do I still need bash-4.2_CVE-2014-7169.diff and bash-4.2_CVE-2014-7186_CVE-2014-7187.diff or are they covered by the official patches (49 and 50)?
|
Quote:
Thanks again, Rick |
@mancha, @MadMaverick9, @Didier Spaier, @moisespedro
thanx all for your swift replies. I'm waiting for the next maintenance window to apply the said patches. |
First known 0day Bash exploit :
http://www.kernelmode.info/forum/vie...&t=3505#p23987 It involves telnet, Busybox and a botnet with a CnC server that changes its IP address every now and then. There are much more programs prone to exploits that just the CGI modules of Apache. The dhcpcd server and the botnet described above are more scarier than that, IHMO. |
hi, I'm reporting a DoS vulnerability in sysklogd/rsyslog: https://bugzilla.redhat.com/show_bug.cgi?id=1142373
anyone can confirm? |
Quote:
default) the issue appears limited to mis-addressing (Note: this can only affect you if you enable remote-reception on sysklogd). My sysklogd fix is ready but I am awaiting a reply from Rainer (my fix also addresses another issue which might affect rsyslog so I have decided to share with Rainer privately first). If you do use rsyslog with remote-reception enabled, you should upgrade to the latest versions which address CVE-2014-3634. --mancha |
thank you mancha. my first concern was about sysklogd, which seems not to be actively maintained upstream, and it's used in slackware as syslogd/klogd.
|
Even after patching, the old bash binary can still be "ressurrected" from memory
http://stevejenkins.com/blog/2014/09...d-from-memory/ |
All times are GMT -5. The time now is 03:45 AM. |