Configuration Information [Automatically generated, do not change]: Machine: i686 OS: linux-gnu Compiler: gcc Compilation CFLAGS: -DPROGRAM='bash' -DCONF_HOSTTYPE='i686' -DCONF_OSTYPE='linux-gnu' -DCONF_MACHTYPE='i686-pc-linux-gnu' -DCONF_VENDOR='pc' -DLOCALEDIR='/usr/share/locale' -DPACKAGE='bash' -DSHELL -DHAVE_CONFIG_H -I. -I../. -I.././include -I.././lib -D_FORTIFY_SOURCE=2 -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall uname output: Linux Freestyle 3.11.0-12-generic #19-Ubuntu SMP Wed Oct 9 16:12:00 UTC 2013 i686 i686 i686 GNU/Linux Machine Type: i686-pc-linux-gnu
Bash Version: 4.3 Patch Level: 11 Release Status: release Description: Log files are showing an increased level of buffer overflows from common CLI usage and scripts that previously did not result in excessive overflows being passed. Repeat-By: Mostly this is from interactive CLI usage and commands passed from well written GUI scripts (mostly py). Some bash scripts are involved. The same scripts passed to zsh (edited appropriately) do not result in this level of buffer overflow. Fix: When I use zsh or rollback to a previous version of bash (pre-March 2014) it returns to previous level of issues (minimal with occasional overflows). The issue with this fix is the obvious, security issue over the summer made it dangerous to use an unpatched bash. -- Electronic mail (email) is not a confidential form of communication. In order to ensure confidentiality and to protect your privacy, please use discretion when sending information that is sensitive in nature.