Security advisories for Monday
Debian has updated chromium-browser (multiple vulnerabilities).
Fedora has updated libvncserver (F20: multiple vulnerabilities), nodejs (F20; F19: denial of service), perl-Data-Dumper (F20: denial of service), and v8 (F20; F19: multiple vulnerabilities).
Mageia has updated bash (code injection, command execution) and kernel (MG3: denial of service).
Mandriva has updated perl-XML-DT (file overwrites).
openSUSE has updated bash (13.1, 12.3; 12.3; 13.1; 11.4; 13.2: multiple vulnerabilities), dbus-1 (13.1; 12.3: multiple vulnerabilities), kernel (11.4: multiple vulnerabilities), geary (13.1: TLS certificate issues), bash (11.4: command execution), mozilla-nss (13.1, 12.3: signature forgery), NSS (11.4: signature forgery), php5 (11.4: multiple vulnerabilities), php5 (11.4: more vulnerabilities), srtp (13.1: denial of service), and wireshark (13.1, 12.3: multiple vulnerabilities).
Slackware has updated firefox (multiple vulnerabilities), thunderbird: (multiple vulnerabilities) and seamonkey (multiple vulnerabilities).
SUSE has updated bash (SLE11, SLE10:
multiple vulnerabilities) and mozilla-nss
(SLES11 SP2: signature forgery).
Posted Sep 29, 2014 19:47 UTC (Mon)
by proski (subscriber, #104)
[Link] (17 responses)
Posted Sep 29, 2014 20:00 UTC (Mon)
by corbet (editor, #1)
[Link] (16 responses)
Posted Sep 29, 2014 20:09 UTC (Mon)
by proski (subscriber, #104)
[Link] (15 responses)
Posted Sep 29, 2014 21:01 UTC (Mon)
by rahulsundaram (subscriber, #21946)
[Link] (14 responses)
Posted Sep 29, 2014 23:19 UTC (Mon)
by sjj (guest, #2020)
[Link] (13 responses)
Still, I wish RH or at least Fedora would have followed suit. I'd rather keep shell script interpreter basic and encourage people to use a real scripting language instead (and yes, I break my own recommendation all the time).
Is symlinking dash to /bin/sh going to get Red Hat support respond with "sorrythatsnotasupportedconfigurationkthxbai"?
Posted Sep 29, 2014 23:49 UTC (Mon)
by rahulsundaram (subscriber, #21946)
[Link] (12 responses)
As for RHEL, you will have to look at the support policy to answer that but if you should be ok if you can reproduce the issues with whatever is considered a supported configuration. Atleast this was the way custom kernels/kernel modules were treated.
Posted Sep 30, 2014 1:36 UTC (Tue)
by mathstuf (subscriber, #69389)
[Link] (4 responses)
Posted Sep 30, 2014 2:17 UTC (Tue)
by rahulsundaram (subscriber, #21946)
[Link] (3 responses)
Posted Sep 30, 2014 6:25 UTC (Tue)
by eru (subscriber, #2753)
[Link] (2 responses)
Posted Sep 30, 2014 10:53 UTC (Tue)
by rahulsundaram (subscriber, #21946)
[Link] (1 responses)
Posted Sep 30, 2014 12:35 UTC (Tue)
by eru (subscriber, #2753)
[Link]
Dunno. The answer probably depends on the work-load, so I suspect there is no single answer. In any case it cannot hurt, except for the one-time work of fixing #!/bin/sh -marked scripts containing bash-isms.
Posted Sep 30, 2014 7:31 UTC (Tue)
by matthias (subscriber, #94967)
[Link] (6 responses)
The security problems arise when the shell is invoked non-interactively and then executes injected code (by CGI scripts, from dhcp client, etc.). People could execute arbitrary code with root privileges on all computers in the LAN by just running a malicious DHCP server, when the DHCP client copies some data from the DHCP offer to environment variables and then executes a shell script using bash. This is a standard configuration in some distributions.
Posted Sep 30, 2014 10:55 UTC (Tue)
by rahulsundaram (subscriber, #21946)
[Link] (5 responses)
Posted Sep 30, 2014 17:51 UTC (Tue)
by perlwolf (guest, #46060)
[Link] (4 responses)
With bash being a interactive shell, it has lots of features that are useful to the interactive user - each of those features is a piece of code that could conceivably have a bug that allows non-interactive use run things in an unexpected way. Each pair of features (both the basic features and the extre interactive features) can have bugs in the way the two features affect each other - the number of such interactions goes up as the square of the total number of features.
The shells that don't have the extra interactive features have fewer places that might provide leaks, both in the code of the features that are omitted and in the myriad ways that those features could have interacted with the rest of the shell's capabilities. So, while the smaller shells can also have their own bugs, there are probably far fewer of them than with bash.
Posted Sep 30, 2014 21:00 UTC (Tue)
by mathstuf (subscriber, #69389)
[Link] (1 responses)
That's assuming the interactions between A and B is orthogonal to C. I wouldn't bet on this. I'd bet more on it being some exponential function.
Posted Sep 30, 2014 21:13 UTC (Tue)
by perlwolf (guest, #46060)
[Link]
You're right, of course - if there a a way of using the interaction between A and B, there will often be related interactions between C, D, ... with either A or B (or both) that can take advantage of the same effect in a similar way.
Bugs travel in swarms.
Posted Oct 2, 2014 0:17 UTC (Thu)
by nix (subscriber, #2304)
[Link]
Posted Oct 2, 2014 4:59 UTC (Thu)
by rahulsundaram (subscriber, #21946)
[Link]
https://lists.fedoraproject.org/pipermail/devel/2014-Octo...
I think it's a safe bet that there will be more bash fixes soon. People have started looking at it. I wonder if a bash fork is coming.
bash
I'd be surprised to see a fork. There don't appear to be maintainership issues here; it's more a matter of people having the time to actually look at and fix the code. What we're more likely to see is projects moving away from bash where a simpler shell will do; see Debian's use of dash, for example.
bash
The question is whether dash gets as many eyeballs as bash. Or maybe we should be talking of eyeballs per line of code?
bash
bash
bash
bash
bash
bash
Even with systemd, /bin/sh gets invoked non-interactively all the time in a running Linux system as "glue". So making it fast and light-weight would still be a win.
bash
bash
Has anyone measured that?
bash
bash
bash
bash
bash
bash
bash
bash
