BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Shellshock
- Subject: [Discuss] Shellshock
- From: richard.pieri at gmail.com (Richard Pieri)
- Date: Wed, 01 Oct 2014 11:07:05 -0400
- In-reply-to: <CAAbKA3U4r-rxkAW33HPfv6FJE36rqDJx6qESbrS4r7G_VBN1Mw@mail.gmail.com>
- References: <542B5DFA.2080108@gmail.com> <542B5F49.3050500@gmail.com> <CAAbKA3U4r-rxkAW33HPfv6FJE36rqDJx6qESbrS4r7G_VBN1Mw@mail.gmail.com>
On 9/30/2014 10:59 PM, Bill Ricker wrote: > Code injection in a critical gut component like /bin/sh ... > implemented with a link. Oops ! And Lennart wonders why some of us hate his code. > Note that Multiple additional BASH security bugs have been found > and/or fixed since they started looking harder in the last week. Which is not a bad thing as long as the people looking actually understand what they are looking at and what they are looking for. It's not so much the quantity of eyes as the quality of those eyes. -- Rich P.
- Follow-Ups:
- [Discuss] Shellshock
- From: bill.n1vux at gmail.com (Bill Ricker)
- [Discuss] Shellshock
- Prev by Date: [Discuss] Shellshock
- Next by Date: [Discuss] Server/laptop full-disk encryption
- Previous by thread: [Discuss] Shellshock
- Next by thread: [Discuss] Shellshock
- Index(es):