Arches, please test and mark stable: =app-shells/bash-4.2_p29 Target KEYWORDS : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
(In reply to comment #0) > Arches, please test and mark stable: > > =app-shells/bash-4.2_p29 > > Target KEYWORDS : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc > x86" Arches, please test and mark stable: =app-shells/bash-4.2_p37 Target KEYWORDS : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
As per http://www.openwall.com/lists/oss-security/2012/07/12/3 this is now a security bug.
amd64 stable
x86 stable
Stable for HPPA.
arm stable
Stable ppc
ppc64 done
alpha/ia64/m68k/s390/sh/sparc stable
Thanks, folks. GLSA request filed.
CVE-2012-3410 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3410): Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.
This issue was resolved and addressed in GLSA 201210-05 at http://security.gentoo.org/glsa/glsa-201210-05.xml by GLSA coordinator Sean Amoss (ackle).
backported to older SLOTs here: http://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d3b9fc42cadf308da7fab21c338cca55aa778ae7