Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140926211441.GB31108@openwall.com>
Date: Sat, 27 Sep 2014 01:14:41 +0400
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: chet.ramey@...e.edu
Subject: Re: CVE-2014-6271: remote code execution through bash

On Thu, Sep 25, 2014 at 07:40:50PM -0400, Chet Ramey wrote:
> On 9/25/14, 12:19 PM, Solar Designer wrote:
> 
> > I think Florian's prefix-suffix patch is actually a better way to go
> > (right now, unless there's some drawback I am not yet aware of), and at
> > a later time function imports should require to be enabled with a
> > non-default option.
> 
> Yes, some variant of that will be the next thing to work on.

I suggest that you use Florian's prefix-suffix convention as-is (not
necessarily the code, but same prefixes and suffixes, so that your
official change would be compatible with Florian's patch).  This is
because multiple distros have adopted Florian's patch already.  While
we'll be breaking compatibility for function exports/imports across
pre-patch and post-patch bash versions anyway, at least you can maintain
compatibility between distros' bash packages and your official releases.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.