alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T14:01:34Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3424Pingu doesn't always add routes to main table when interface comes up2019-07-23T14:01:34ZAlex DowadPingu doesn't always add routes to main table when interface comes upPingu copies the default routes from each monitored interface into a
different routing table, and then removes/adds them from/to the main
routing table when the interface goes up/down.
However, several times now, we have discovered that...Pingu copies the default routes from each monitored interface into a
different routing table, and then removes/adds them from/to the main
routing table when the interface goes up/down.
However, several times now, we have discovered that the default routes
on an Alpine-powered router have been “lost” — they aren’t there in the
main table. In every case, pingu is still running, and considers one
interface to be “up”. The default routes which it copied into tables 1
and 2 can be found there.
I intend to debug this myself, but am posting here to record the fact
that a problem exists, and so that any others who are experiencing the
same problem can post in the same thread.
*(from redmine: issue id 3424, created on 2014-10-13, closed on 2019-06-11)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3423Postfix on musl2019-07-23T14:01:35ZJens VehlhaberPostfix on muslPostfix on musl environment missing file descriptors. The Postfix
configuration header src/util/sys\_defs.h search *GLIBC* value on line
813. The environment worth GLIBC is not there. For use postfix with file
descriptors, insert the fol...Postfix on musl environment missing file descriptors. The Postfix
configuration header src/util/sys\_defs.h search *GLIBC* value on line
813. The environment worth GLIBC is not there. For use postfix with file
descriptors, insert the following patch on APKBUILD:
sed -i -e “s:(*GLIBC* < 2):(defined(*GLIBC*) \\&\\& (*GLIBC* <
2)):” src/util/sys\_defs.h || return 1
Not tested under uclibc!
*(from redmine: issue id 3423, created on 2014-10-13, closed on 2014-10-23)*
* Changesets:
* Revision 1f4cc3c6082aec393b1f7019fedc582d366f57c1 by Natanael Copa on 2014-10-14T08:26:55Z:
```
main/postfix: fix file descriptor passing
we need check if __GLIBC__ is defined at all before comparing verision
ref #3423
```
* Revision 04df56e6ad45c03d346ee3820f1b70356d174c76 by Natanael Copa on 2014-10-14T08:31:53Z:
```
main/postfix: fix file descriptor passing
we need check if __GLIBC__ is defined at all before comparing version
fixes #3423
```
* Uploads:
* ![postfix-milter-error](/uploads/27b1ee4e94dad9050995937dd0ca6bdc/postfix-milter-error.png)3.0.6https://gitlab.alpinelinux.org/alpine/aports/-/issues/3422tshark has bash as dependency2019-07-23T14:01:36ZMika Havelatshark has bash as dependencyI can’t see that bash really needs to be a depency for tshark.
As there’s been some security flawns with bash (from what I understand,
they are fixed in Alpine Linux by now) it would “feel better” not to
have ‘bash’ as a dependency for...I can’t see that bash really needs to be a depency for tshark.
As there’s been some security flawns with bash (from what I understand,
they are fixed in Alpine Linux by now) it would “feel better” not to
have ‘bash’ as a dependency for tshark.
So please investigate and (if possible) remove bash as dependency for
tshark.
I would be glad if this was backported to Alpine Linux 2.7
Thank you!
<<mhavela>>
*(from redmine: issue id 3422, created on 2014-10-10, closed on 2014-11-18)*
* Relations:
* relates #3407
* relates #3402
* Changesets:
* Revision 4c373130773eeb5747272d184e59260ca7046ae5 by Natanael Copa on 2014-10-14T08:33:30Z:
```
main/wireshark: remove bash dependency
ref #3422
(cherry picked from commit cba47f69473832e01f3b3fda8c684579da2d0bc0)
Conflicts:
main/wireshark/APKBUILD
```
* Revision 9600f4b76755c8ba33e2e06b2dcec06d413098c8 by Natanael Copa on 2014-10-14T10:15:51Z:
```
main/wireshark: remove bash dependency
fixes #3422
(cherry picked from commit cba47f69473832e01f3b3fda8c684579da2d0bc0)
Conflicts:
main/wireshark/APKBUILD
```Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3420initfs won't boot encrypted rootfs from LVM2019-07-23T14:01:37ZJohannes Matheisinitfs won't boot encrypted rootfs from LVM/usr/share/mkinitfs/initramfs-init first calls start\_cryptsetup and
then start\_lvm.
On a system with encrypted logical volumes the order has to be reversed.
*(from redmine: issue id 3420, created on 2014-10-08, closed on 2017-04-07.../usr/share/mkinitfs/initramfs-init first calls start\_cryptsetup and
then start\_lvm.
On a system with encrypted logical volumes the order has to be reversed.
*(from redmine: issue id 3420, created on 2014-10-08, closed on 2017-04-07)*
* Changesets:
* Revision 4c42c322adc76ab8c6991cb697b1076dea7c8a91 by Natanael Copa on 2014-11-10T13:52:57Z:
```
main/mkinitfs: upgrade to 2.7.0
fixes #3240
fixes #3420
```Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3418qemu and RBD2021-11-24T22:05:27ZJean-Charles de Longuevilleqemu and RBDIt would be nice to add “—enable-rbd \\” in qemu compile options
(http://git.alpinelinux.org/cgit/aports/tree/main/qemu/APKBUILD?id=7825a6536e55bfcd20bb84eec0fabc23bf879c71)
to allow one to launch qemu instance from a CEPH cluster
*(...It would be nice to add “—enable-rbd \\” in qemu compile options
(http://git.alpinelinux.org/cgit/aports/tree/main/qemu/APKBUILD?id=7825a6536e55bfcd20bb84eec0fabc23bf879c71)
to allow one to launch qemu instance from a CEPH cluster
*(from redmine: issue id 3418, created on 2014-10-04)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3417openvswitch post-upgrade script exited with error 1 on run-from-ram usb and O...2019-07-23T14:01:38ZJean-Charles de Longuevilleopenvswitch post-upgrade script exited with error 1 on run-from-ram usb and OVS not launched while running in sys mode (hdd)installing openvswitch (edge/testing) is now a breeze.
But, with **run-from-ram** (usb), at subsequent reboot after “rc-update
add ovs-modules;rc-update add ovsdb-server;rc-update add
ovs-vswitchd;lbu ci;reboot” was issued the post-upgr...installing openvswitch (edge/testing) is now a breeze.
But, with **run-from-ram** (usb), at subsequent reboot after “rc-update
add ovs-modules;rc-update add ovsdb-server;rc-update add
ovs-vswitchd;lbu ci;reboot” was issued the post-upgrade script always
complain that /etc/openvswitch/conf.db is in use and exit with return
code 1.
apk fix let us see the same message in details
Reinstalling openvswitch (2.3.0-r4)
Executing openvswitch-2.3.0-r4.post-upgrade
Trying scema migration for /etc/openvswitch/conf.db...
2014-10-02T16:29:11Z|00001|lockfile|WARN|/etc/openvswitch/.conf.db.~lock~: cannot lock file because it is already locked by pid 1756
ovsdb-tool: /etc/openvswitch/conf.db: failed to lock lockfile (Resource temporarily unavailable)
ERROR: openvswitch-2.3.0-r4.post-upgrade: script exited with error 1
Executing busybox-1.22.1.r13.trigger
1 errors; 75 MiB in 90 packages
*<span
class="installed openvswitch and qemu qemu-system-x86_64 only have I"></span>*
This is not a big deal as everything seems to work. But I guess that for
a *real* upgrade this may cause problem…
On the other hand, while **running from HDD** (sys mode), even if
“rc-update add ovs-modules;rc-update add ovsdb-server;rc-update add
ovs-vswitchd” was previously issued, the OVS daemons do not start at
boot time. One has to start those by hand…
*(from redmine: issue id 3417, created on 2014-10-02, closed on 2015-12-09)*
* Relations:
* relates #3498
* Changesets:
* Revision 21dbf20f52bed1e9ca112acc550013be68e5c17b by Natanael Copa on 2014-10-06T16:12:21Z:
```
testing/openvswitch: fix creation/upgrade of database
Instead of create/update database from install script we do it from
init.d script. This is becase:
- we need /dev/urandom, which might not exist til until the mdev/udev
service is started. We cannot assume those are running during
install
- in case of upgrade, if the service is running (which is normally is)
we will get locking error because the db is in use.
We solve both those things by creating/upgrading the database before
starting it, from the init.d script.
fixes #3417
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/3416[v3.0] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE...2019-07-23T14:01:39ZAlexander Belous[v3.0] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7188)The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entri...The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entries
to be created
•CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI
injection
•CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also a new vulnerability CVE-2014-7188 have not been fixed in an
official release, however a patch is already enabled:
•CVE-2014-7188: Improper MSR range used for x2APIC emulation.
The patch could be found by the link below.
References:
FIXES in 4.2.5:
http://xenproject.org/downloads/xen-archives/supported-xen-42-series/xen-425.html
FIXES in 4.3.3:
http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-433.html
PATCH: http://xenbits.xen.org/xsa/advisory-108.html
*(from redmine: issue id 3416, created on 2014-10-02, closed on 2014-10-23)*
* Relations:
* parent #34123.0.5Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3415[v2.7] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE...2019-07-23T14:01:40ZAlexander Belous[v2.7] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7188)The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entri...The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entries
to be created
•CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI
injection
•CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also a new vulnerability CVE-2014-7188 have not been fixed in an
official release, however a patch is already enabled:
•CVE-2014-7188: Improper MSR range used for x2APIC emulation.
The patch could be found by the link below.
References:
FIXES in 4.2.5:
http://xenproject.org/downloads/xen-archives/supported-xen-42-series/xen-425.html
FIXES in 4.3.3:
http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-433.html
PATCH: http://xenbits.xen.org/xsa/advisory-108.html
*(from redmine: issue id 3415, created on 2014-10-02, closed on 2014-10-23)*
* Relations:
* parent #3412
* Changesets:
* Revision 1c0379e85192c0cbfe5d8b88f449726f4f327496 by Natanael Copa on 2014-10-14T09:58:25Z:
```
main/xen: upgrade to 4.3.3 and fix CVE-2014-7188
The following critical vulnerabilities have been fixed:
- CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
- CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries
to be created
- CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
- CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also add patch for xsa108:
- CVE-2014-7188: Improper MSR range used for x2APIC emulation.
fixes #3415
```Alpine 2.7.10Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3414[v2.6] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE...2019-07-23T14:01:41ZAlexander Belous[v2.6] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7188)The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entri...The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entries
to be created
•CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI
injection
•CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also a new vulnerability CVE-2014-7188 have not been fixed in an
official release, however a patch is already enabled:
•CVE-2014-7188: Improper MSR range used for x2APIC emulation.
The patch could be found by the link below.
References:
FIXES in 4.2.5:
http://xenproject.org/downloads/xen-archives/supported-xen-42-series/xen-425.html
FIXES in 4.3.3:
http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-433.html
PATCH: http://xenbits.xen.org/xsa/advisory-108.html
*(from redmine: issue id 3414, created on 2014-10-02, closed on 2014-10-23)*
* Relations:
* parent #3412
* Changesets:
* Revision 9cb167cd17104bb4b0bb6b7097ad9f924fa158f9 by Natanael Copa on 2014-10-02T16:43:32Z:
```
main/xen: upgrade to 4.3.3 and fix CVE-2014-7188
The following critical vulnerabilities have been fixed:
- CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
- CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries
to be created
- CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
- CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also add patch for xsa108:
- CVE-2014-7188: Improper MSR range used for x2APIC emulation.
fixes #3414
```Alpine 2.6.7Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3413[v2.5] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE...2019-07-23T14:01:42ZAlexander Belous[v2.5] xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7188)The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entri...The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entries
to be created
•CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI
injection
•CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also a new vulnerability CVE-2014-7188 have not been fixed in an
official release, however a patch is already enabled:
•CVE-2014-7188: Improper MSR range used for x2APIC emulation.
The patch could be found by the link below.
References:
FIXES in 4.2.5:
http://xenproject.org/downloads/xen-archives/supported-xen-42-series/xen-425.html
FIXES in 4.3.3:
http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-433.html
PATCH: http://xenbits.xen.org/xsa/advisory-108.html
*(from redmine: issue id 3413, created on 2014-10-02, closed on 2014-10-23)*
* Relations:
* parent #3412Alpine 2.5.5Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3412xen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE-2014-3...2019-07-23T14:01:43ZAlexander Belousxen: multiple issues (CVE-2014-2599, CVE-2014-3124, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7188)The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entri...The following critical vulnerabilities have been fixed in new version of
xen (4.2.5 and 4.3.3):
•CVE-2014-2599 / XSA-89 HVMOP\_set\_mem\_access is not preemptible
•CVE-2014-3124 / XSA-92 HVMOP\_set\_mem\_type allows invalid P2M entries
to be created
•CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI
injection
•CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also a new vulnerability CVE-2014-7188 have not been fixed in an
official release, however a patch is already enabled:
•CVE-2014-7188: Improper MSR range used for x2APIC emulation.
The patch could be found by the link below.
References:
FIXES in 4.2.5:
http://xenproject.org/downloads/xen-archives/supported-xen-42-series/xen-425.html
FIXES in 4.3.3:
http://xenproject.org/downloads/xen-archives/supported-xen-43-series/xen-433.html
PATCH: http://xenbits.xen.org/xsa/advisory-108.html
*(from redmine: issue id 3412, created on 2014-10-02, closed on 2014-10-23)*
* Relations:
* child #3413
* child #3414
* child #3415
* child #3416
* Changesets:
* Revision 60ab8e12aecd5f2691495bcc3a8bf5b956777c33 by Natanael Copa on 2014-10-02T16:40:34Z:
```
main/xen: upgrade to 4.3.3 and fix CVE-2014-7188
The following critical vulnerabilities have been fixed:
- CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
- CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries
to be created
- CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
- CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also add patch for xsa108:
- CVE-2014-7188: Improper MSR range used for x2APIC emulation.
ref #3412
```
* Revision 9cba7900153b15f9070445e546fd8244cb2da8f1 by Natanael Copa on 2014-10-23T11:48:32Z:
```
main/xen: security upgrade to 4.2.5 and patches
The 4.2.5 release fixes:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
In addition we add patches for:
CVE-2014-7154 / XSA-104 Race condition in HVMOP_track_dirty_vram
CVE-2014-7155 / XSA-105 Missing privilege level checks in x86 HLT, LGDT,
LIDT, and LMSW emulation
CVE-2014-7156 / XSA-106 Missing privilege level checks in x86 emulation of
software interrupts
CVE-2014-7188 / XSA-108 Improper MSR range used for x2APIC emulation
fixes #3412
fixes #3457
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/3411[v3.0] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,...2019-07-23T14:01:44ZAlexander Belous[v3.0] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,CVE-2014-6277,CVE-2014-6278)The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has dis...The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has disclosed that over the past two days he has
discovered previously unaddressed issues in the Bash function parser,
one of which is as bad as the original Shellshock vulnerability.
CVE-2014-7186:
It was discovered that the fixed-sized redir\_stack could be forced to
overflow in the Bash parser, resulting in memory corruption, and
possibly leading to arbitrary code execution when evaluating untrusted
input that would not otherwise be run as code.
CVE-2014-7187:
An off-by-one error was discovered in the way Bash was handling deeply
nested flow control constructs. Depending on the layout of the .bss
segment, this could allow arbitrary execution of code that would not
otherwise be executed by Bash.
CVE-2014-6277: bash: untrusted pointer use issue leading to code
execution
CVE-2014-6278: bash: code execution via specially crafted environment
variables
References:
DETAILED:
http://lcamtuf.blogspot.ro/2014/09/bash-bug-apply-unofficial-patch-now.html
http://www.itnews.com.au/News/396256,further-flaws-render-shellshock-patch-ineffective.aspx
PATCH: http://www.openwall.com/lists/oss-security/2014/09/25/13
PATCH: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027
http://seclists.org/oss-sec/2014/q3/735
https://access.redhat.com/security/cve/CVE-2014-7186
https://access.redhat.com/security/cve/CVE-2014-7187
https://access.redhat.com/security/cve/CVE-2014-6277
https://access.redhat.com/security/cve/CVE-2014-6278
*(from redmine: issue id 3411, created on 2014-10-01, closed on 2014-10-02)*
* Relations:
* parent #3407
* Changesets:
* Revision 2fb12d286710e300e1793ecbce11a548beda713b on 2014-10-02T14:39:56Z:
```
main/bash: update to 4.3.28, fix CVE-2014-7186 and CVE-2014-7187
fixes #3411
```3.0.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3410[v2.7] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,...2019-07-23T14:01:45ZAlexander Belous[v2.7] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,CVE-2014-6277,CVE-2014-6278)The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has dis...The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has disclosed that over the past two days he has
discovered previously unaddressed issues in the Bash function parser,
one of which is as bad as the original Shellshock vulnerability.
CVE-2014-7186:
It was discovered that the fixed-sized redir\_stack could be forced to
overflow in the Bash parser, resulting in memory corruption, and
possibly leading to arbitrary code execution when evaluating untrusted
input that would not otherwise be run as code.
CVE-2014-7187:
An off-by-one error was discovered in the way Bash was handling deeply
nested flow control constructs. Depending on the layout of the .bss
segment, this could allow arbitrary execution of code that would not
otherwise be executed by Bash.
CVE-2014-6277: bash: untrusted pointer use issue leading to code
execution
CVE-2014-6278: bash: code execution via specially crafted environment
variables
References:
DETAILED:
http://lcamtuf.blogspot.ro/2014/09/bash-bug-apply-unofficial-patch-now.html
http://www.itnews.com.au/News/396256,further-flaws-render-shellshock-patch-ineffective.aspx
PATCH: http://www.openwall.com/lists/oss-security/2014/09/25/13
PATCH: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027
http://seclists.org/oss-sec/2014/q3/735
https://access.redhat.com/security/cve/CVE-2014-7186
https://access.redhat.com/security/cve/CVE-2014-7187
https://access.redhat.com/security/cve/CVE-2014-6277
https://access.redhat.com/security/cve/CVE-2014-6278
*(from redmine: issue id 3410, created on 2014-10-01, closed on 2014-10-02)*
* Relations:
* parent #3407
* Changesets:
* Revision 8f16f06990c6cf37335a37903d8907f4078a9b38 by Natanael Copa on 2014-10-02T14:48:19Z:
```
main/bash: security upgrade to 4.2.051 (CVE-2014-7186,CVE-2014-7187)
fixes #3410
```Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3409[v2.6] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,...2019-07-23T14:01:46ZAlexander Belous[v2.6] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,CVE-2014-6277,CVE-2014-6278)The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has dis...The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has disclosed that over the past two days he has
discovered previously unaddressed issues in the Bash function parser,
one of which is as bad as the original Shellshock vulnerability.
CVE-2014-7186:
It was discovered that the fixed-sized redir\_stack could be forced to
overflow in the Bash parser, resulting in memory corruption, and
possibly leading to arbitrary code execution when evaluating untrusted
input that would not otherwise be run as code.
CVE-2014-7187:
An off-by-one error was discovered in the way Bash was handling deeply
nested flow control constructs. Depending on the layout of the .bss
segment, this could allow arbitrary execution of code that would not
otherwise be executed by Bash.
CVE-2014-6277: bash: untrusted pointer use issue leading to code
execution
CVE-2014-6278: bash: code execution via specially crafted environment
variables
References:
DETAILED:
http://lcamtuf.blogspot.ro/2014/09/bash-bug-apply-unofficial-patch-now.html
http://www.itnews.com.au/News/396256,further-flaws-render-shellshock-patch-ineffective.aspx
PATCH: http://www.openwall.com/lists/oss-security/2014/09/25/13
PATCH: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027
http://seclists.org/oss-sec/2014/q3/735
https://access.redhat.com/security/cve/CVE-2014-7186
https://access.redhat.com/security/cve/CVE-2014-7187
https://access.redhat.com/security/cve/CVE-2014-6277
https://access.redhat.com/security/cve/CVE-2014-6278
*(from redmine: issue id 3409, created on 2014-10-01, closed on 2014-10-02)*
* Relations:
* parent #3407
* Changesets:
* Revision 5eb71d2da76922363cee1f48af6452c6be607b0e by Natanael Copa on 2014-10-02T14:50:18Z:
```
main/bash: security upgrade to 4.2.051 (CVE-2014-7186,CVE-2014-7187)
fixes #3409
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3408[v2.5] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,...2019-07-23T14:01:46ZAlexander Belous[v2.5] bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,CVE-2014-6277,CVE-2014-6278)The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has dis...The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has disclosed that over the past two days he has
discovered previously unaddressed issues in the Bash function parser,
one of which is as bad as the original Shellshock vulnerability.
CVE-2014-7186:
It was discovered that the fixed-sized redir\_stack could be forced to
overflow in the Bash parser, resulting in memory corruption, and
possibly leading to arbitrary code execution when evaluating untrusted
input that would not otherwise be run as code.
CVE-2014-7187:
An off-by-one error was discovered in the way Bash was handling deeply
nested flow control constructs. Depending on the layout of the .bss
segment, this could allow arbitrary execution of code that would not
otherwise be executed by Bash.
CVE-2014-6277: bash: untrusted pointer use issue leading to code
execution
CVE-2014-6278: bash: code execution via specially crafted environment
variables
References:
DETAILED:
http://lcamtuf.blogspot.ro/2014/09/bash-bug-apply-unofficial-patch-now.html
http://www.itnews.com.au/News/396256,further-flaws-render-shellshock-patch-ineffective.aspx
PATCH: http://www.openwall.com/lists/oss-security/2014/09/25/13
PATCH: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027
http://seclists.org/oss-sec/2014/q3/735
https://access.redhat.com/security/cve/CVE-2014-7186
https://access.redhat.com/security/cve/CVE-2014-7187
https://access.redhat.com/security/cve/CVE-2014-6277
https://access.redhat.com/security/cve/CVE-2014-6278
*(from redmine: issue id 3408, created on 2014-10-01, closed on 2014-10-02)*
* Relations:
* parent #3407
* Changesets:
* Revision c5620781d3e7f795abf791b2141830d90835c255 by Natanael Copa on 2014-10-02T16:13:56Z:
```
main/bash: security upgrade to 4.2.051 (CVE-2014-7186,CVE-2014-7187)
fixes #3408
```Alpine 2.5.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3407bash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,CVE-20...2019-07-23T14:01:48ZAlexander Belousbash: various unresolved security issues (CVE-2014-7186,CVE-2014-7187,CVE-2014-6277,CVE-2014-6278)The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has dis...The Shellshock vulnerability in Bash command line interpreter shell is
likely to require more patches, as security researchers continue to
unearth further problems in the code. Google security researcher Michal
“lcamtuf” Zalewski has disclosed that over the past two days he has
discovered previously unaddressed issues in the Bash function parser,
one of which is as bad as the original Shellshock vulnerability.
**CVE-2014-7186:**
It was discovered that the fixed-sized redir\_stack could be forced to
overflow in the Bash parser, resulting in memory corruption, and
possibly leading to arbitrary code execution when evaluating untrusted
input that would not otherwise be run as code.
**CVE-2014-7187:**
An off-by-one error was discovered in the way Bash was handling deeply
nested flow control constructs. Depending on the layout of the .bss
segment, this could allow arbitrary execution of code that would not
otherwise be executed by Bash.
**CVE-2014-6277:** bash: untrusted pointer use issue leading to code
execution
**CVE-2014-6278:** bash: code execution via specially crafted
environment variables
References:
DETAILED:
http://lcamtuf.blogspot.ro/2014/09/bash-bug-apply-unofficial-patch-now.html
http://www.itnews.com.au/News/396256,further-flaws-render-shellshock-patch-ineffective.aspx
PATCH: http://www.openwall.com/lists/oss-security/2014/09/25/13
PATCH: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027
http://seclists.org/oss-sec/2014/q3/735
https://access.redhat.com/security/cve/CVE-2014-7186
https://access.redhat.com/security/cve/CVE-2014-7187
https://access.redhat.com/security/cve/CVE-2014-6277
https://access.redhat.com/security/cve/CVE-2014-6278
*(from redmine: issue id 3407, created on 2014-10-01, closed on 2014-10-02)*
* Relations:
* relates #3402
* relates #3422
* child #3408
* child #3409
* child #3410
* child #3411https://gitlab.alpinelinux.org/alpine/aports/-/issues/3406[v3.0] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2...2019-07-23T14:01:48ZAlexander Belous[v3.0] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2014-6271 CVE-2014-7169)GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving th...GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving the ForceCommand feature in OpenSSH
sshd, the mod\_cgi and mod\_cgid modules in the Apache HTTP Server,
scripts executed by unspecified DHCP clients, and other situations in
which setting the environment occurs across a privilege boundary from
Bash execution, aka “ShellShock.” NOTE: the original fix for this issue
was incorrect; CVE-2014-7169 has been assigned to cover the
vulnerability that is still present after the incorrect fix.
•MISC:
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1141597
•CONFIRM:
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
•URL:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
•URL: http://www.debian.org/security/2014/dsa-3032
•URL: http://rhn.redhat.com/errata/RHSA-2014-1293.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1294.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1295.html
•URL: http://www.ubuntu.com/usn/USN-2362-1
•URL: http://www.us-cert.gov/ncas/alerts/TA14-268A
•URL: http://www.kb.cert.org/vuls/id/252743
*(from redmine: issue id 3406, created on 2014-09-30, closed on 2014-10-02)*
* Relations:
* parent #3402
* Changesets:
* Revision b108201b23905cdc800e45e67c483d4cf277d1e5 by Natanael Copa on 2014-09-30T09:11:06Z:
```
main/bash: security upgrade to 4.3.027 (CVE-2014-7169)
fixes #3406
```3.0.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3405[v2.7] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2...2019-07-23T14:01:50ZAlexander Belous[v2.7] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2014-6271 CVE-2014-7169)GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving th...GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving the ForceCommand feature in OpenSSH
sshd, the mod\_cgi and mod\_cgid modules in the Apache HTTP Server,
scripts executed by unspecified DHCP clients, and other situations in
which setting the environment occurs across a privilege boundary from
Bash execution, aka “ShellShock.” NOTE: the original fix for this issue
was incorrect; CVE-2014-7169 has been assigned to cover the
vulnerability that is still present after the incorrect fix.
•MISC:
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1141597
•CONFIRM:
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
•URL:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
•URL: http://www.debian.org/security/2014/dsa-3032
•URL: http://rhn.redhat.com/errata/RHSA-2014-1293.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1294.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1295.html
•URL: http://www.ubuntu.com/usn/USN-2362-1
•URL: http://www.us-cert.gov/ncas/alerts/TA14-268A
•URL: http://www.kb.cert.org/vuls/id/252743
*(from redmine: issue id 3405, created on 2014-09-30, closed on 2014-10-02)*
* Relations:
* parent #3402
* Changesets:
* Revision 22917adad93516ce61457203e8e42e9a52d14d59 by Natanael Copa on 2014-09-30T09:10:22Z:
```
main/bash: security upgrade to 4.2.050 (CVE-2014-7169)
fixes #3405
```Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3404[v2.6] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2...2019-07-23T14:01:51ZAlexander Belous[v2.6] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2014-6271 CVE-2014-7169)GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving th...GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving the ForceCommand feature in OpenSSH
sshd, the mod\_cgi and mod\_cgid modules in the Apache HTTP Server,
scripts executed by unspecified DHCP clients, and other situations in
which setting the environment occurs across a privilege boundary from
Bash execution, aka “ShellShock.” NOTE: the original fix for this issue
was incorrect; CVE-2014-7169 has been assigned to cover the
vulnerability that is still present after the incorrect fix.
•MISC:
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1141597
•CONFIRM:
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
•URL:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
•URL: http://www.debian.org/security/2014/dsa-3032
•URL: http://rhn.redhat.com/errata/RHSA-2014-1293.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1294.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1295.html
•URL: http://www.ubuntu.com/usn/USN-2362-1
•URL: http://www.us-cert.gov/ncas/alerts/TA14-268A
•URL: http://www.kb.cert.org/vuls/id/252743
*(from redmine: issue id 3404, created on 2014-09-30, closed on 2014-10-02)*
* Relations:
* parent #3402
* Changesets:
* Revision 98e53b85668e85c771945ca75e96c79ed056a796 by Natanael Copa on 2014-09-30T09:09:08Z:
```
main/bash: security upgrade to 4.2.050 (CVE-2014-7169)
fixes #3404
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3403[v2.5] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2...2019-07-23T14:01:52ZAlexander Belous[v2.5] bash: Shellshock vulnerabilities allowing remote code execution (CVE-2014-6271 CVE-2014-7169)GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving th...GNU Bash through 4.3 processes trailing strings after function
definitions in the values of environment variables, which allows remote
attackers to execute arbitrary code via a crafted environment, as
demonstrated by vectors involving the ForceCommand feature in OpenSSH
sshd, the mod\_cgi and mod\_cgid modules in the Apache HTTP Server,
scripts executed by unspecified DHCP clients, and other situations in
which setting the environment occurs across a privilege boundary from
Bash execution, aka “ShellShock.” NOTE: the original fix for this issue
was incorrect; CVE-2014-7169 has been assigned to cover the
vulnerability that is still present after the incorrect fix.
•MISC:
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1141597
•CONFIRM:
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
•URL:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
•URL: http://www.debian.org/security/2014/dsa-3032
•URL: http://rhn.redhat.com/errata/RHSA-2014-1293.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1294.html
•URL: http://rhn.redhat.com/errata/RHSA-2014-1295.html
•URL: http://www.ubuntu.com/usn/USN-2362-1
•URL: http://www.us-cert.gov/ncas/alerts/TA14-268A
•URL: http://www.kb.cert.org/vuls/id/252743
*(from redmine: issue id 3403, created on 2014-09-30, closed on 2014-10-02)*
* Relations:
* parent #3402
* Changesets:
* Revision 8e27e51f9a2030178c74ca4e47825c8e3514b6ec by Natanael Copa on 2014-09-30T09:08:54Z:
```
main/bash: security upgrade to 4.2.50 (CVE-2014-7169)
fixes #3403
```Alpine 2.5.5Natanael CopaNatanael Copa