Re: Issue with Bash-4.3 Official Patch 27

2014-10-17 Thread Chet Ramey
On 10/17/14, 11:34 AM, Greg Wooledge wrote: > 3) Everything else. These are ignored. > Not quite. Bash saves them and adds them to the environment it passes to the external commands it invokes. Bash is transparent with respect to environment variables it doesn't handle. Chet -- ``The lyf so

Re: Issue with Bash-4.3 Official Patch 27

2014-10-17 Thread Chet Ramey
On 10/17/14, 11:22 AM, lorenz.bucher@rohde-schwarz.com wrote: > No, I can't. > $ foo%%="bar" > foo%%=bar: command not found You just demonstrated what I wrote: > No, shell variable names should continue to be shell identifiers. You > can already use `%' (any character, really) in environmen

Re: Issue with Bash-4.3 Official Patch 27

2014-10-17 Thread Chet Ramey
On 10/16/14, 4:37 PM, Geir Hauge wrote: > Regardless though, shouldn't source <(declare -xp) work whether or not > the environment contains invalid identifiers? It doesn't at present: > > $ env %=% bash -c 'echo "$BASH_VERSION"; source <(declare -xp)' > 4.3.30(1)-release > /dev/fd/63: line 1: dec

Re: commands do not ignore TSTP if TSTP ignored already

2014-10-17 Thread Chet Ramey
On 10/16/14, 12:38 AM, idal...@idallen.ca wrote: > Bash Version: 4.2 > Patch Level: 25 > Release Status: release > > Description: > > If a bash shell script starts up with TSTP ignored, commands run by that > script will not ignore TSTP, even if you set a trap in the script to > ignore TSTP. If

Re: bash-2.05b-013 appears to not work

2014-10-17 Thread Dave Kalaluhi
Awesome - Thanks everyone for the help! I will forward these responses on to the security group. But again, Thank you everyone!!! -Dave On 10/17/14, Andreas Schwab wrote: > Eric Blake writes: > >> The following is a better test for whether CVE-2014-7187 can be >> exploited to remotely attack yo

Re: Issue with Bash-4.3 Official Patch 27

2014-10-17 Thread Greg Wooledge
> Von:Chet Ramey > No, shell variable names should continue to be shell identifiers. You > can already use `%' (any character, really) in environment variable > names. On Fri, Oct 17, 2014 at 05:22:30PM +0200, lorenz.bucher@rohde-schwarz.com wrote: > No, I can't. > $ foo%%="bar" > foo%

Re: Issue with Bash-4.3 Official Patch 27

2014-10-17 Thread Lorenz . Bucher . ext
No, I can't. $ foo%%="bar" foo%%=bar: command not found Or better said not in the normal way $ set foo%%=bar -- Mit freundlichen Grüßen Lorenz Bucher TechConnect GmbH Im Auftrag der/on behalf of Rohde & Schwarz GmbH & Co. KG Postfach 80 14 69 • 81614 München Mühldorfstraße 15 • 81671

Re: bash-2.05b-013 appears to not work

2014-10-17 Thread Andreas Schwab
Eric Blake writes: > The following is a better test for whether CVE-2014-7187 can be > exploited to remotely attack your system: > > f='() { echo vulnerable; } bash -c f Missing quote character. f='() { echo vulnerable; }' bash -c f Andreas. -- Andreas Schwab, sch...@linux-m68k.org GPG Key f

Re: bash-2.05b-013 appears to not work

2014-10-17 Thread Eric Blake
On 10/17/2014 08:18 AM, Greg Wooledge wrote: > On Fri, Oct 17, 2014 at 10:10:36AM -0400, Dave Kalaluhi wrote: >> Locally we are using: >> >> (for x in {1..200} ; do echo "for x$x in ; do :"; done; for x in >> {1..200} ; do echo done ; done) | bash || >> echo "CVE-2014-7187 vulnerable, word_lineno"

Re: bash-2.05b-013 appears to not work

2014-10-17 Thread Greg Wooledge
On Fri, Oct 17, 2014 at 10:10:36AM -0400, Dave Kalaluhi wrote: > Locally we are using: > > (for x in {1..200} ; do echo "for x$x in ; do :"; done; for x in > {1..200} ; do echo done ; done) | bash || > echo "CVE-2014-7187 vulnerable, word_lineno" As mentioned in previous emails on this topic, tha

Re: bash-2.05b-013 appears to not work

2014-10-17 Thread Dave Kalaluhi
I guess that would help. I meant to include that in the initial mail, but alas, running in 50K directions. Locally we are using: (for x in {1..200} ; do echo "for x$x in ; do :"; done; for x in {1..200} ; do echo done ; done) | bash || echo "CVE-2014-7187 vulnerable, word_lineno" If we run the t