BUG in arithcomp: bypass of the check condition and arbitrary read/write of shell variables

2020-04-10 Thread Raffaele Florio via Bug reports for the GNU Bourne Again SHell
Machine: x86_64 OS: linux-gnu Compiler: gcc Compilation CFLAGS: -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redh

Re: BUG in arithcomp: bypass of the check condition and arbitrary read/write of shell variables

2020-04-10 Thread Greg Wooledge
On Fri, Apr 10, 2020 at 09:44:31AM +, Raffaele Florio via Bug reports for the GNU Bourne Again SHell wrote: > Indeed the functions called by arithcomp cause the evaluation of the supplied > arithcomp function argument, potentially fed by user input. > Give in input "x=42,xyz=UID" to the belo

SEGFAULT ON TILDE EXPANSION

2020-04-10 Thread kutay üner
Configuration Information [Automatically generated, do not change]: Machine: x86_64 OS: linux-gnu Compiler: gcc Compilation CFLAGS: -O0 -ggdb -Wno-parentheses -Wno-format-security uname output: Linux hk 5.6.3-arch1-1 #9 SMP PREEMPT Thu, 09 Apr 2020 03:39:30 + x86_64 GNU/Linux Machine Type: x86_