Announcement

Collapse
No announcement yet.

A new BASH bug?

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • SteveRiley
    replied
    Originally posted by whatthefunk View Post
    Just checked on my HTC One running Android 4.4....bash wasnt found. Maybe its only in Cyanogenmod?
    You're right. I downloaded the factory image from Google and unpacked it. No Bash in /system/xbin. Did the same with Cyanogenmod and -- yep -- there it is. Good call; I'll amend my earlier post.

    Leave a comment:


  • jpenguin
    replied
    Also, it looks like most Android phones are not vulnerable because they use a Bash alternative.
    http://www.vox.com/2014/9/25/6843949...-bug-explained

    Also, there are installers for bash on android

    https://play.google.com/store/apps/d...KcKsogTd8oCwAQ

    Pretty sure bash isn't standard to android

    Leave a comment:


  • whatthefunk
    replied
    Originally posted by SteveRiley View Post
    Good idea -- done.


    Apparently so. Here's my Nexus 4, running Cyanogenmod snapshot M10, built from Android 4.4.4:




    Nope, these particular vulnerabilities exist only in Bash.

    But that doesn't mean the other shells are free of potential vulnerabilities. Either no one's looked, or no one's reporting their findings.
    Just checked on my HTC One running Android 4.4....bash wasnt found. Maybe its only in Cyanogenmod?

    Leave a comment:


  • SteveRiley
    replied
    Originally posted by Feathers McGraw View Post
    Hang on, wasn't the openssl bug found because Google and that other company did code audits?
    Codenomicon was the other entity. They have the best write-up. Amusingly, Codenomicon tripped over the vulnerability while they were working on improvements to their product that, uh, looks for vulnerabilities A Google researcher discovered it independenty, but I'm not finding any details about the circumstances -- whether the finding was a true code audit or some other process. Neither of these changes the fact that the vulnerable code was released in early 2012, enabled by default, and sat there on millions of web servers for two years.

    Originally posted by Feathers McGraw View Post
    Thanks for your description of how things work at Microsoft, it's interesting. What's the ratio of developers to testers?
    Don't know the ratio, sorry.

    Originally posted by Feathers McGraw View Post
    I read once that security guys often pick through open source projects to get a few CVEs on their CVs, is that true?
    I've never done such a thing!

    Leave a comment:


  • SteveRiley
    replied
    Originally posted by kubicle View Post
    Should merge threads to avoid duplication.
    Good idea -- done.

    Originally posted by whatthefunk View Post
    Does Android use Bash?
    Apparently so. Not in the factory Android images from Google. Alternate ROMs may have it. Here's my Nexus 4, running Cyanogenmod snapshot M10, built from Android 4.4.4. You can see that Bash is part of this ROM:



    Originally posted by jpenguin View Post
    So... are dash, ksh or tcsh affected?
    Nope, these particular vulnerabilities exist only in Bash.

    But that doesn't mean the other shells are free of potential vulnerabilities. Either no one's looked, or no one's reporting their findings.
    Last edited by SteveRiley; Oct 04, 2014, 01:31 AM. Reason: Bash isn't in factory images.

    Leave a comment:


  • kubicle
    replied
    We have a thread for 'shellshock' already: https://www.kubuntuforums.net/showth...A-new-BASH-bug

    Should merge threads to avoid duplication.

    Leave a comment:


  • jpenguin
    replied
    Bring back tin-foil hat Linux!

    Leave a comment:


  • claydoh
    replied
    Unless you are running some sort of a server facing the internet, then you are unlikely to need to worry about this, especially as the patches have been coming.
    There is a fair bit of click-baiting on many websites about this, adding to the frenzy. And of course every single script-kiddie wannabe "hacker" is out there trying stuff out.











    I went to grab my conspiracy-theory party hat, but it is a bit tattered and worn now

    Leave a comment:


  • mbohets
    replied
    When I look in synaptic, I see both bash and dash are installed. (and also csh)

    I read in the press that even after the patches bash is not totally in the clear.
    Would Kubuntu still work when I remove bash ?
    When I mark it for removal, I get a warning that it may make Kubuntu unusable.

    Leave a comment:


  • GreyGeek
    replied
    anika200, your installation, if you haven't disabled auto update, was patched twice, once on the 25th and again on the 26th. Other shells are not affected. Kubuntu, btw, uses dash, not bash. Other apps may call bash so that is why it was quickly patched. That scare has mostly evaporated before the script kiddies or pro hackers could exploit it, although many began trying after the bug was announced. But, it was too late. Those who have done a standard install and disabled auto update are probably still vulnerable, as are those who still use "admin" for a name and "12345" for a password.

    Leave a comment:


  • anika200
    replied
    I am having trouble determining what version of bash I have installed or do I have both somehow?

    If I do this:
    Code:
    lee@lee-asrock:~$ bash --version
    GNU bash, version 4.3.11(1)-release (x86_64-pc-linux-gnu)
    Copyright (C) 2013 Free Software Foundation, Inc.
    And if I search with apt:
    Code:
    bash/trusty-updates,trusty-security,now 4.3-7ubuntu1.4 amd64 [installed]  GNU Bourne Again SHell

    Leave a comment:


  • jpenguin
    replied
    So... are dash, ksh or tcsh affected?

    Leave a comment:


  • Feathers McGraw
    replied
    Originally posted by SteveRiley View Post
    Yes, the source code is visible for everyone to look at, but who's actually doing that? In the case of OpenSSL and Bash, apparently no one.
    Hang on, wasn't the openssl bug found because Google and that other company did code audits?

    Thanks for your description of how things work at Microsoft, it's interesting. What's the ratio of developers to testers?

    I read once that security guys often pick through open source projects to get a few CVEs on their CVs, is that true?

    Leave a comment:


  • SteveRiley
    replied
    Originally posted by Feathers McGraw View Post
    OK I'll bite... how would we know if there are old vulnerabilities in Windows without being able to see the code? I guess you've seen it, but it's just a black box to the rest of us.
    So here's a little bit of truth that a lot of people either don't know or choose to ignore.

    In the open source world, it's popular to claim "many eyes" help improve overall security. But, recently, the industry has seen two major instances of where this claim is demonstrably false: first Heartbleed, now Shellshock. Yes, the source code is visible for everyone to look at, but who's actually doing that? In the case of OpenSSL and Bash, apparently no one.

    Here's what happens inside Microsoft. Developers work on code. There are several strict guidelines about safe and unsafe coding -- these came out of the Secure Windows Initiative in the early 2000s. Finished code is given to testers, whose primary job is to try to break stuff. Will they catch everything? Of course not. But they're good at what they do, they know how to think like bad guys, and the tools for finding vulnerable code have steadily improved over time.

    How many open source projects have the luxury of individuals spending their full time on software quality and assurance?

    Originally posted by Feathers McGraw View Post
    I wonder if the BASH vulnerability was discovered because someone thought to have a rummage through some old code after heartbleed was discovered... hopefully all of this will result in more code audits by professionals and hobbyists alike, there are bound to be more bugs to find. Gotta catch 'em all
    Software testing is not a sexy job. Testers earn less than developers and (in some organizations) testers are viewed with disdain ("All that ******* does is call my {software | baby} ugly"). Testing is also more difficult than coding. Less sex + more work = fewer interested people. The industry needs to work on this perception, and raise the awareness and the reward structure of the QA aspects of software engineering.

    Leave a comment:


  • TWPonKubuntu
    replied
    Originally posted by SteveRiley View Post
    Why, because Windows, while having its own share of vulnerabilities that have taken a few years to fix, never had one so old as this?

    Or because Microsoft also has the capability of releasing emergency out-of-band patches for remote-access vulnerabilities that have exploit code in the wild?

    I fail to understand why people still have the urge to make security comparisons. All software has bugs. Some bugs enable malicious behavior. What matters is that the industry as a whole continue to improve code quality, redouble its efforts at examining legacy code, and remain vigilant against adversaries.
    My opinion here:
    [rant]
    The M$ product and its update system pale in comparison to the 'nix support system. I used M$ (past tense) and sold M$ (again, past tense). Please take no offense here, my comment was never intended to suggest that Linux security is somehow less diligent than "other" software varieties. RE your two options above, I regard them as true statements of how M$ works, however they are embedded in the M$ monolithic architecture and this does not (in my experience) work as well as the Linux system. I'm NOT tempted to compare them point for point (which would be kind of pointless, pun intended). From my experience, Linux works better because it is better.

    Yes, as you note, every software has glitches and I no longer support the M$ system because the number and frequency of such problems was high. My comment: "Be glad this isn't Windoze..." is my advice to everyone. Enjoy the fact that we are able, allowed, and can afford to use Linux. If that sounds like I not being "fair" to the M$ product and system, then I confess, I am biased and proud of it...

    This current vulnerability will be patched and it will be done quickly and publicly. I'm not sure I would claim that for an M$ problem... We now return control of your system to the program in progress: [/rant]

    Leave a comment:

Users Viewing This Topic

Collapse

There are 0 users viewing this topic.

Working...
X