Configuration Information [Automatically generated, do not change]:
Machine: i686
OS: linux-gnu
Compiler: gcc
Compilation CFLAGS:  -DPROGRAM='bash' -DCONF_HOSTTYPE='i686'
-DCONF_OSTYPE='linux-gnu' -DCONF_MACHTYPE='i686-pc-linux-gnu'
-DCONF_VENDOR='pc' -DLOCALEDIR='/usr/share/locale' -DPACKAGE='bash' -DSHELL
-DHAVE_CONFIG_H   -I.  -I../. -I.././include -I.././lib
 -D_FORTIFY_SOURCE=2 -g -O2 -fstack-protector --param=ssp-buffer-size=4
-Wformat -Werror=format-security -Wall
uname output: Linux Freestyle 3.11.0-12-generic #19-Ubuntu SMP Wed Oct 9
16:12:00 UTC 2013 i686 i686 i686 GNU/Linux
Machine Type: i686-pc-linux-gnu

Bash Version: 4.3
Patch Level: 11
Release Status: release

Description:
Log files are showing an increased level of buffer overflows from common
CLI usage and scripts that previously did not result in excessive overflows
being passed.

Repeat-By:
Mostly this is from interactive CLI usage and commands passed from well
written GUI scripts (mostly py). Some bash scripts are involved. The same
scripts passed to zsh (edited appropriately) do not result in this level of
buffer overflow.

Fix:
When I use zsh or rollback to a previous version of bash (pre-March 2014)
it returns to previous level of issues (minimal with occasional overflows).
The issue with this fix is the obvious, security issue over the summer made
it dangerous to use an unpatched bash.



-- 
Electronic mail (email) is not a confidential form of communication.  In
order to ensure confidentiality and to protect your privacy, please use
discretion when sending information that is sensitive in nature.

Reply via email to