Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • aports aports
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 725
    • Issues 725
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 380
    • Merge requests 380
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • alpine
  • aportsaports
  • Issues
  • #2992

Closed
Open
Created Jun 05, 2014 by Alexander Belous@belousa

[v2.6] bash: security feature bypassed

A bug was reported in bash up to 4.3. In some circumstances the bash security feature could be bypassed allowing the bash to be a valid target shell in an attack.
The bug has not been fixed by developers. However a patch exists.

http://seclists.org/bugtraq/2014/Jun/28
COMMIT: http://hmarco.org/bugs/bash\_4.3-setuid-bug.html

(from redmine: issue id 2992, created on 2014-06-05, closed on 2014-06-19)

  • Relations:
    • parent #2990 (closed)
  • Changesets:
    • Revision 883b411c by Natanael Copa on 2014-06-17T11:57:19Z:
main/bash: fix setuid bug

ref #2990
fixes #2992

(cherry picked from commit 15eb98780f3c051d2835df3860b5bcba16bf1aae)

Conflicts:
	main/bash/APKBUILD
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking