[no subject]

2017-11-07 Thread root
ubject: [50 character or so descriptive subject here (for reference)] Configuration Information [Automatically generated, do not change]: Machine: x86_64 OS: linux-gnu Compiler: gcc Compilation CFLAGS: -DPROGRAM='bash' -DCONF_HOSTTYPE='x86_64' -DCONF_OSTYPE='linux-gnu' -DCONF_MACHTYPE='x86_64-re

Re: remove empty '' in ${var@Q} result?

2017-11-07 Thread Clark Wang
On Tue, Oct 31, 2017 at 3:53 PM, Clark Wang wrote: > On Tue, Oct 31, 2017 at 3:25 PM, Clark Wang wrote: > >> On Mon, Oct 30, 2017 at 10:41 PM, Chet Ramey wrote: >> >>> >>> This is an effect of using single quotes in the @Q operator. If you want >>> to single-quote a string containing single quo

Re: remove empty '' in ${var@Q} result?

2017-11-07 Thread Clark Wang
On Mon, Oct 30, 2017 at 8:35 PM, Greg Wooledge wrote: > > What's the bug? They are equivalent. > It's not a bad thing if we can make the language a bit more elegant unless the cost is not worth it. > > If you mean "I would like bash to perform a second optimization pass > over the result of ${

Claim `declare' as a special command in manual?

2017-11-07 Thread Clark Wang
For now the `declare' command is under SHELL BUILTIN COMMANDS in the man page so people may think bash parses the command line parameters the same way as other built-in commands which is not true. [STEP 100] # echo $BASH_VERSION 4.4.12(4)-release [STEP 101] # declare -a arr=() [STEP 102] #

Re: Potential Denial of Service Vulnerability in embedded commands - Bash version 4.4.12(1) - Release

2017-11-07 Thread Chet Ramey
On 11/7/17 9:56 AM, Alex Nichols wrote: > Thank you for taking the time to respond to my email.  > I accept that this is likely not a security issue outside of being a social > engineering attack, but the  buggy behaviour that i'm curious about is that > in each case the allocation should only have

Re: Potential Denial of Service Vulnerability in embedded commands - Bash version 4.4.12(1) - Release

2017-11-07 Thread Chet Ramey
On 11/7/17 6:58 AM, Alex Nichols wrote: > Hi All, > > > I’m an Ethical Hacking student at Coventry university and while doing some > exploit development on my Linux boxes I stumbled across a bug in the bash > 4.4.12(1) - release. As others have explained, this is not a bug, nor is it any kind of

Re: Potential Denial of Service Vulnerability in embedded commands - Bash version 4.4.12(1) - Release

2017-11-07 Thread Alex Nichols
Thank you for taking the time to respond to my email. I accept that this is likely not a security issue outside of being a social engineering attack, but the buggy behaviour that i'm curious about is that in each case the allocation should only have been of 2147483647 bytes in size (the size of th

Re: Potential Denial of Service Vulnerability in embedded commands - Bash version 4.4.12(1) - Release

2017-11-07 Thread Eduardo Bustamante
On Tue, Nov 7, 2017 at 5:58 AM, Alex Nichols wrote: [...] > In order to trigger the bug I executed the command *`*cat sploit.buf*`* > where sploit.buf is a just over 2GB file of ‘A’ characters. When this > command is executed the bash terminal crashes with the following error > “Bash: xrealloc: ..

Re: Potential Denial of Service Vulnerability in embedded commands - Bash version 4.4.12(1) - Release

2017-11-07 Thread Greg Wooledge
On Tue, Nov 07, 2017 at 11:58:40AM +, Alex Nichols wrote: > In order to trigger the bug I executed the command *`*cat sploit.buf*`* > This bug may present a potential security risk as a malicious user may be > able to crash a users bash session by tricking them into executing a > malicious bas

Potential Denial of Service Vulnerability in embedded commands - Bash version 4.4.12(1) - Release

2017-11-07 Thread Alex Nichols
Hi All, I’m an Ethical Hacking student at Coventry university and while doing some exploit development on my Linux boxes I stumbled across a bug in the bash 4.4.12(1) - release. In order to trigger the bug I executed the command *`*cat sploit.buf*`* where sploit.buf is a just over 2GB file of ‘