Re: [OpenIndiana-discuss] Bash bug issue

2014-11-04 Thread Bruce Lilly
On Tue, Nov 4, 2014 at 2:58 AM, Jim Klimov  wrote:

> >On Mon, 3 Nov 2014, Bruce Lilly wrote:
> >>
> >> As of this late date, /usr/bin/bash here is in fact the bash
> >executable,
> >> not a link; but that means that it's 32-bit only and might well
> [...]
> So most of the programs (thousands of binaries supplied with a sol10
> distro and extension discs) remained 32-bit only. A minority of the
> lrograms that were deemed to really need this (under 700? or even 100?)
> were dual-built and provided with the isaexec hack to pick the right binary
> at run-time depending on the running kernel (32/64).


One more note applicable to bash before I start a separate thread regarding
32-bit vs. 64 bit issues that aren't bash-specific:

# ls /bin/amd64/*sh /*/bin/amd64/*sh /*/*/bin/amd64/*sh | egrep -v
"lish|ush|mash|rash|\.sh|ssh"
/bin/amd64/bash
/bin/amd64/ksh
/bin/amd64/rbash
/bin/amd64/rksh
/bin/amd64/tclsh
/bin/amd64/tcsh
/bin/amd64/wish
/bin/amd64/zoomsh
/usr/bin/amd64/bash
/usr/bin/amd64/ksh
/usr/bin/amd64/rbash
/usr/bin/amd64/rksh
/usr/bin/amd64/tclsh
/usr/bin/amd64/tcsh
/usr/bin/amd64/wish
/usr/bin/amd64/zoomsh
/usr/openwin/bin/amd64/bash


/usr/openwin/bin/amd64/ksh


/usr/openwin/bin/amd64/rbash


/usr/openwin/bin/amd64/rksh


/usr/openwin/bin/amd64/tclsh


/usr/openwin/bin/amd64/tcsh


/usr/openwin/bin/amd64/wish


/usr/openwin/bin/amd64/zoomsh


/usr/X/bin/amd64/bash


/usr/X/bin/amd64/ksh


/usr/X/bin/amd64/rbash


/usr/X/bin/amd64/rksh


/usr/X/bin/amd64/tclsh


/usr/X/bin/amd64/tcsh
/usr/X/bin/amd64/wish
/usr/X/bin/amd64/zoomsh
/usr/X11/bin/amd64/bash
/usr/X11/bin/amd64/ksh
/usr/X11/bin/amd64/rbash
/usr/X11/bin/amd64/rksh
/usr/X11/bin/amd64/tclsh
/usr/X11/bin/amd64/tcsh
/usr/X11/bin/amd64/wish
/usr/X11/bin/amd64/zoomsh
/usr/X11R6/bin/amd64/bash
/usr/X11R6/bin/amd64/ksh
/usr/X11R6/bin/amd64/rbash
/usr/X11R6/bin/amd64/rksh
/usr/X11R6/bin/amd64/tclsh
/usr/X11R6/bin/amd64/tcsh
/usr/X11R6/bin/amd64/wish
/usr/X11R6/bin/amd64/zoomsh

Evidently there are quite a few shells -- N.B. including bash -- where the
packagers seem to have decided there were issues warranting building and
packaging 64-bit versions.

I'll let somebody else figure out exactly why the recent updated version of
/usr/bin/bash trampled on the isaexec pointing to separate 32- and 64-bit
versions; I don't really care much about bash per se as I don't use it (for
reasons having to do with familiarity, usability, portability, and
reliability; before "shellshock" added security to that list).
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-11-04 Thread Bob Friesenhahn

On Tue, 4 Nov 2014, david allan finch wrote:


On 04/11/2014 03:36, Bob Friesenhahn wrote:
While it would be nice if Solaris software was all 64-bit, in actual 
practice I notice no difference in day to day use between systems with 
32-bit applications and 64-bit.  Only certain memory-hungry
applications will significantly benefit. 


We spent some time investigating this 10 years back and found that for most 
apps that don't require the 64bit address space that they ran slower compiled 
for 64bit. 64bit file access was of some us to us but the we stuck with 64bit 
compiles and I expect that until CPU cache sizes increase a lot more there 
will be no gain outside the OS (and DBs etc) for 99% of current apps.


The AMD64 ABI provides quite a lot more CPU registers than 32-bits. 
The function calling convention has changed to make better use of 
registers for passing values.  This places less stress on the CPU L1 
cache and allows the CPU to juggle more variables at once without 
doing loads/stores.


In performance benchmarks, I do usually see a performance gain due to 
compiling as 64-bits on x86 hardware.  Results are highly compiler 
dependent.


Regardless, most OS 'utilities' are not CPU bound and so the 
difference may not be measurable for normal use.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-11-04 Thread Jim Klimov
4 ноября 2014 г. 4:36:39 CET, Bob Friesenhahn  
пишет:
>On Mon, 3 Nov 2014, Bruce Lilly wrote:
>>
>> As of this late date, /usr/bin/bash here is in fact the bash
>executable,
>> not a link; but that means that it's 32-bit only and might well
>present
>> unexpected issues on 64-bit systems when dealing with large files
>etc.
>> (basically anything that involves pointers, long integers, time_t,
>> ptrdiff_t, clock_t, dev_t, off_t, size_t, or ssize_t in the sources).
>
>Such problems are highly unlikely.  Solaris supports large files (LFS) 
>in 32-bit applications and Autoconf-configured GNU programs use it by 
>default.  Few shell jobs require over 2GB of data, so ptrdiff_t is not 
>likely to be a problem, and size_t and ssize_t are unlikely to cause 
>problems either.  Perhaps time_t is still an issue.
>
>While it would be nice if Solaris software was all 64-bit, in actual 
>practice I notice no difference in day to day use between systems with 
>32-bit applications and 64-bit.  Only certain memory-hungry
>applications will significantly benefit.
>
>Regardless, the OpenIndiana project did produce an updated bash 
>binary.  I initially built my own, but switched to the OpenIndiana 
>version when it became available.
>
>Bob

Also note that 64-bit programs have a larger footprint in memory (bigger 
pointers). While people might dismiss it today (saying all our boxes are big 
anyway) - not all environments are big or get many benefits from such over-use 
of resources. You have laptops, vm's, local zones... even if the hardware box 
is a big powerhouse, why physically deny yourself an ability to run 70 mixed 
workloads instead of 50 64-bit ones (numbers made up arbitrarily)?

Another rationale I saw in a Sun blog back when Solaris 10 was new and young 
(relaying from memory, corruption might collect over the years), was that much 
of the application worker code sufficed to be 32-bit so why not remain such 
(benefits above). Most of the access to larger items can be done with the 
64-bit OS facilities (via syscalls? ipc? weird omnivore linking? I don't 
remember exactly now...)
So most of the programs (thousands of binaries supplied with a sol10 distro and 
extension discs) remained 32-bit only. A minority of the lrograms that were 
deemed to really need this (under 700? or even 100?) were dual-built and 
provided with the isaexec hack to pick the right binary at run-time depending 
on the running kernel (32/64).

So... just in case, here were some old news from the attic ;)
You know where the grain and salt are ;)

//Jim
--
Typos courtesy of K-9 Mail on my Samsung Android

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-11-04 Thread david allan finch

On 04/11/2014 09:07, david allan finch wrote:

we stuck with 64bit compiles


sorry 32bit compiles

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-11-04 Thread david allan finch

On 04/11/2014 03:36, Bob Friesenhahn wrote:
While it would be nice if Solaris software was all 64-bit, in actual 
practice I notice no difference in day to day use between systems with 
32-bit applications and 64-bit.  Only certain memory-hungry
applications will significantly benefit. 


We spent some time investigating this 10 years back and found that for 
most apps that don't require the 64bit address space that they ran 
slower compiled for 64bit. 64bit file access was of some us to us but 
the we stuck with 64bit compiles and I expect that until CPU cache sizes 
increase a lot more there will be no gain outside the OS (and DBs etc) 
for 99% of current apps.




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-11-03 Thread Alan Coopersmith

On 11/ 3/14 07:36 PM, Bob Friesenhahn wrote:

Perhaps time_t is still an issue.


It is.  32-bit binaries will not be able to handle time_t values past
January 2038, whether in API's to get the current time or to access
timestamps on files.

https://blogs.oracle.com/alanc/entry/lp64_bit_by_bit#lp64-abi-changes
lists some other differences between the 32-bit & 64-bit ABI's on
Solaris/illumos OS'es (though illumos won't see the ASLR or ADI
benefits, since those are post-closing additions to Solaris).

--
-Alan Coopersmith-  alan.coopersm...@oracle.com
 Oracle Solaris Engineering - http://blogs.oracle.com/alanc

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-11-03 Thread Bob Friesenhahn

On Mon, 3 Nov 2014, Bruce Lilly wrote:


As of this late date, /usr/bin/bash here is in fact the bash executable,
not a link; but that means that it's 32-bit only and might well present
unexpected issues on 64-bit systems when dealing with large files etc.
(basically anything that involves pointers, long integers, time_t,
ptrdiff_t, clock_t, dev_t, off_t, size_t, or ssize_t in the sources).


Such problems are highly unlikely.  Solaris supports large files (LFS) 
in 32-bit applications and Autoconf-configured GNU programs use it by 
default.  Few shell jobs require over 2GB of data, so ptrdiff_t is not 
likely to be a problem, and size_t and ssize_t are unlikely to cause 
problems either.  Perhaps time_t is still an issue.


While it would be nice if Solaris software was all 64-bit, in actual 
practice I notice no difference in day to day use between systems with 
32-bit applications and 64-bit.  Only certain memory-hungry

applications will significantly benefit.

Regardless, the OpenIndiana project did produce an updated bash 
binary.  I initially built my own, but switched to the OpenIndiana 
version when it became available.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-11-03 Thread Bruce Lilly
On Sat, Oct 4, 2014 at 11:05 AM, cpforum  wrote:

>
> cd /usr/bin
>
> mv bash bash-oi_151a9
>
> ln -s /usr/local/bin/bash bash
>

While that would be reasonable under many operating systems, it *may*
present problems on Solaris-derived systems, especially 64-bit systems.
See http://docs.oracle.com/cd/E18752_01/html/816-5138/index.html (a bit
dated w.r.t. compiler flags, but the principles are still valid, as is most
of the content).
Note in particular that /usr/bin/bash *might* very well be a hard link to
/usr/lib/isaexec and that the real executables *might* live under
/usr/bin/i86pc and /usr/bin/amd64 (on i86 hardware of course).

It would be prudent to check first before moving and/or linking files in
/bin, /usr/bin, /usr/sbin, /usr/lib, ...

Actual conditions depend on whether or not the packager paid any attention
to 32-bit vs. 64-bit issues, and isn't bash-specific.

As of this late date, /usr/bin/bash here is in fact the bash executable,
not a link; but that means that it's 32-bit only and might well present
unexpected issues on 64-bit systems when dealing with large files etc.
(basically anything that involves pointers, long integers, time_t,
ptrdiff_t, clock_t, dev_t, off_t, size_t, or ssize_t in the sources).

If you are building from source on a 64-bit system, I strongly recommend
reading that document.

Note that for ksh, the situation described in the 64-bit Solaris
Developer's Guide applies:
#: isainfo -v
64-bit amd64 applications
cx16 sse3 sse2 sse fxsr mmx cmov amd_sysc cx8 tsc fpu
32-bit i386 applications
ahf cx16 sse3 sse2 sse fxsr mmx cmov sep cx8 tsc fpu
#: ls -l /bin/ksh* /usr/bin/ksh* /bin/*/ksh* /usr/bin/*/ksh*
/usr/lib/isaexec
-r-xr-xr-x  4 root bin 9712 2013-07-21 10:35 /bin/amd64/ksh
-r-xr-xr-x  4 root bin 9712 2013-07-21 10:35 /bin/amd64/ksh93
-r-xr-xr-x  4 root bin 8064 2013-07-21 10:35 /bin/i86/ksh
-r-xr-xr-x  4 root bin 8064 2013-07-21 10:35 /bin/i86/ksh93
-r-xr-xr-x 87 root bin 8064 2013-07-21 10:35 /bin/ksh
-r-xr-xr-x 87 root bin 8064 2013-07-21 10:35 /bin/ksh93
-r-xr-xr-x  4 root bin 9712 2013-07-21 10:35 /usr/bin/amd64/ksh
-r-xr-xr-x  4 root bin 9712 2013-07-21 10:35 /usr/bin/amd64/ksh93
-r-xr-xr-x  4 root bin 8064 2013-07-21 10:35 /usr/bin/i86/ksh
-r-xr-xr-x  4 root bin 8064 2013-07-21 10:35 /usr/bin/i86/ksh93
-r-xr-xr-x 87 root bin 8064 2013-07-21 10:35 /usr/bin/ksh
-r-xr-xr-x 87 root bin 8064 2013-07-21 10:35 /usr/bin/ksh93
-r-xr-xr-x 87 root bin 8064 2013-07-21 10:35 /usr/lib/isaexec

This topic appears not to be addressed adequately on the OpenIndiana wiki
(certainly no mention under Compiling+software+on+OpenIndiana) or the
illumos site (certainly no mention under Building+illumos+and+OpenIndiana
there).  It seems to be something one either knows about or not (I stumbled
upon it while researching why uname -m and uname -p returns the same values
on 32-bit and 64-bit installations (and is therefore useless in determining
whether the installation is 32- or 64-bit), and why all of the executables
in /bin (etc) are 32-bit applications on my 64-bit systems, and why all
executables built on my 64-bit systems are 32-bit executables when built
using default compilation flags -- all of those being unexpected).
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-14 Thread openindi...@out-side.nl
Thanks from me too!

Thanks to all who keep OI alive!

-Oorspronkelijk bericht-
Van: Dmitry Kozhinov [mailto:d...@desktopfay.com] 
Verzonden: dinsdag 14 oktober 2014 17:52
Aan: openindiana-discuss@openindiana.org
Onderwerp: Re: [OpenIndiana-discuss] Bash bug issue

Thanks, Jon!
This makes me really happy with OI.
Actually this small advancement in OI /dev a9 makes me happier than all great 
advancements in /hipster.

Regards,
Dmitry.

> Jon Tibble has just pushed updated bash package with recent security 
> fixes to OI /dev a9.


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-14 Thread Dmitry Kozhinov

Thanks, Jon!
This makes me really happy with OI.
Actually this small advancement in OI /dev a9 makes me happier than all 
great advancements in /hipster.


Regards,
Dmitry.


Jon Tibble has just pushed updated bash package with recent security
fixes to OI /dev a9.



___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-13 Thread Carl Brewer

On 14/10/2014 12:19 AM, Alexander Pyhalov wrote:

Hello.
Jon Tibble has just pushed updated bash package with recent security
fixes to OI /dev a9. Just update your bash to
shell/bash@4.0.28,5.11-0.151.1.9:20140117T202904Z .


Any chance that the same could be done for a8?  I can't get to a9 - it 
always fails to upgrade for me.




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-13 Thread Ron Dawson
Thanks for this!



On Mon, Oct 13, 2014 at 1:19 PM, Alexander Pyhalov  wrote:

> Hello.
> Jon Tibble has just pushed updated bash package with recent security fixes
> to OI /dev a9. Just update your bash to 
> shell/bash@4.0.28,5.11-0.151.1.9:20140117T202904Z
> .
> --
> Best regards,
> Alexander Pyhalov,
> system administrator of Southern Federal University IT department
>
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-13 Thread Alexander Pyhalov

On 10/13/2014 17:19, Alexander Pyhalov wrote:

Hello.
Jon Tibble has just pushed updated bash package with recent security
fixes to OI /dev a9. Just update your bash to
shell/bash@4.0.28,5.11-0.151.1.9:20140117T202904Z .


Sorry, you want more fresh version - 
shell/bash@4.0.28,5.11-0.151.1.9:20141013T104806Z


--
Best regards,
Alexander Pyhalov,
system administrator of Southern Federal University IT department

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


[OpenIndiana-discuss] Bash bug issue

2014-10-13 Thread Alexander Pyhalov

Hello.
Jon Tibble has just pushed updated bash package with recent security 
fixes to OI /dev a9. Just update your bash to 
shell/bash@4.0.28,5.11-0.151.1.9:20140117T202904Z .

--
Best regards,
Alexander Pyhalov,
system administrator of Southern Federal University IT department

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-09 Thread Udo Grabowski (IMK)

On 09/10/2014 14:18, Cal Sawyer wrote:

Thanks very much for the reply and the succinct description of what's
happened to OI development, Udo

Good luck to everyone who's using OI in actual production!  Me and my
65TB need to leave the building :)


We have 400 TB and are still in...

--
Dr.Udo Grabowski   Inst.f.Meteorology & Climate Research IMK-ASF-SAT
http://www.imk-asf.kit.edu/english/sat.php
KIT - Karlsruhe Institute of Technology   http://www.kit.edu
Postfach 3640,76021 Karlsruhe,Germany T:(+49)721 608-26026 F:-926026

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-09 Thread Cal Sawyer
Thanks very much for the reply and the succinct description of what's 
happened to OI development, Udo


Good luck to everyone who's using OI in actual production!  Me and my 
65TB need to leave the building :)


best regards,

- cal sawyer

On 06/10/14 14:30, Udo Grabowski (IMK) wrote:

On 06/10/2014 14:54, Cal Sawyer wrote:

...
If the only solutions being offered after nearly 2 weeks are a) use 
ksh because bash is somehow inferior (shades of 
"csh-is-deterimental") or 2. rebuild bash youself from source, i'd 
have to say that imho it's the polar opposite and this appears to be 
confirmed in Andreas's post.



The simple fact is: The /dev maintainer(s?) seem to have silently
resigned without handing over the keys
So no one is left who actually can apply and distribute the
patch (which shouldn't be that difficult, as it's only one package);
the /hipster community up to now has served only itself for the
purpose of porting the complete OI userland to gcc, and now, as
the pressure is rising, is trying to reorganise to take over /dev
to actually make stable and useable production releases.
This will take time, but I'm completely with you that a patch
for /dev/ should be made available as fast as possible, so the very
first task is to actually get access to the /dev/ infrastructure
to get at least something started.



___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-07 Thread Bayard Bell
No new CVE. This looks to be a proper fix for CVE-2014-6278, where the
assessment is that the parser bugs that make this exploitable were already
addressed either by the Red Hat patches or upstream patch 027. That's what
I gather between these sources:

https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00032.html
http://lcamtuf.blogspot.co.uk/2014/09/bash-bug-apply-unofficial-patch-now.html
http://lcamtuf.blogspot.co.uk/2014/09/quick-notes-about-bash-bug-its-impact.html

Note that patch 030 for bash 4.3 is attributed to lcamtuf. I've not found
any security responders who shipped previously available fixes telling
people that they need to ship these further changes as an urgent response
or even that they have to have them. Red Hat explicitly references
lcamtuf's blog post as independent confirmation of their analysis and fixes.

Cheers,
Bayard

On 7 October 2014 04:19, Richard L. Hamilton  wrote:

> Which CVE is that, or is it something else?
>
> On Oct 6, 2014, at 9:35 PM, Bob Friesenhahn 
> wrote:
>
> > The gift keeps on giving.  There is yet another related security patch
> for bash.  Here is the one for bash 4.3:
> >
> > http://lists.gnu.org/archive/html/bug-bash/2014-10/msg00040.html
> >
> > Bob
> > --
> > Bob Friesenhahn
> > bfrie...@simple.dallas.tx.us,
> http://www.simplesystems.org/users/bfriesen/
> > GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
> >
> > ___
> > openindiana-discuss mailing list
> > openindiana-discuss@openindiana.org
> > http://openindiana.org/mailman/listinfo/openindiana-discuss
> >
>
>
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread Richard L. Hamilton
Which CVE is that, or is it something else?

On Oct 6, 2014, at 9:35 PM, Bob Friesenhahn  
wrote:

> The gift keeps on giving.  There is yet another related security patch for 
> bash.  Here is the one for bash 4.3:
> 
> http://lists.gnu.org/archive/html/bug-bash/2014-10/msg00040.html
> 
> Bob
> -- 
> Bob Friesenhahn
> bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
> GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
> 
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
> 


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread Bob Friesenhahn
The gift keeps on giving.  There is yet another related security patch 
for bash.  Here is the one for bash 4.3:


http://lists.gnu.org/archive/html/bug-bash/2014-10/msg00040.html

Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread Bayard Bell
These aren't new aspects of the bug. The fact is that default operation of
systems using bash as the shell for interpolation with system or for
scripts interpreted by bash allows remote code execution by taking strings
from untrusted sources (e.g. USER_AGENT in web servers) and passing them
through the environment, which allows remote code execution. What you're
reporting here is instances of the resulting problem in products matching
this description, not fundamental changes to the understanding of the bug.

What's been difficult is that Red Hat's security response team and bash
upstream initially differed on the scope of the issue and thus patching, as
Red Hat believed there were broader problems and that upstream patches were
therefore too limited in scope. Red Hat was subsequently shown to be
correct.

The confusion is that there are a number of CVEs out there, and the patches
went out in batches. There are quite a variety of tests proposed for the
fully documented CVEs, and some of the CVEs remain embargoed, with Red Hat
simply advising that people take patches which bash upstream subsequently
accepted.

On 6 October 2014 18:58, The Outsider  wrote:

> Search q-nap & shellshock and you see how deep this goes...
>
>
> On 6 oktober 2014 19:28:00 David Brodbeck  wrote:
>
>  On Thu, Oct 2, 2014 at 8:12 AM, Alan Coopersmith <
>> alan.coopersm...@oracle.com> wrote:
>>
>> > On 10/ 2/14 07:00 AM, Brandon Hume wrote:
>> >
>> >> On many (most?  all?) Linuxes, /bin/sh *is* /bin/bash.
>> >>
>> >
>> > Many, but not all - the Debian family and some others use a lighter
>> weight,
>> > POSIX compatible shell instead, dash, the Debian Almquist Shell; and
>> many
>> > embedded distros use BusyBox instead.
>> >
>> > https://en.wikipedia.org/wiki/Almquist_shell
>> > http://lwn.net/Articles/343924/
>>
>>
>>
>> A big driver of this was faster boot, since boot scripts run on /bin/sh.
>> On some systems the startup time for all those bash processes was a
>> considerable portion of the total boot time.
>>
>> Note: It's not enough to make sure no CGI scripts are being run with
>> /bin/bash.  You also need to make sure no bash processes are being
>> launched
>> by other scripts, since many scripting languages launch a shell to run
>> external commands.  Unless the environment is explicitly cleared these are
>> likely to inherit the environment of the calling process, with all the
>> nasties in it.
>>
>> --
>> D. Brodbeck
>> System Administrator, Linguistics
>> University of Washington
>> GPG key fingerprint: 0DB7 4B50 8910 DBC5 B510 79C4 3970 2BC3 2078 D875
>> ___
>> openindiana-discuss mailing list
>> openindiana-discuss@openindiana.org
>> http://openindiana.org/mailman/listinfo/openindiana-discuss
>>
>
>
>
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread The Outsider

Search q-nap & shellshock and you see how deep this goes...


On 6 oktober 2014 19:28:00 David Brodbeck  wrote:


On Thu, Oct 2, 2014 at 8:12 AM, Alan Coopersmith <
alan.coopersm...@oracle.com> wrote:

> On 10/ 2/14 07:00 AM, Brandon Hume wrote:
>
>> On many (most?  all?) Linuxes, /bin/sh *is* /bin/bash.
>>
>
> Many, but not all - the Debian family and some others use a lighter weight,
> POSIX compatible shell instead, dash, the Debian Almquist Shell; and many
> embedded distros use BusyBox instead.
>
> https://en.wikipedia.org/wiki/Almquist_shell
> http://lwn.net/Articles/343924/



A big driver of this was faster boot, since boot scripts run on /bin/sh.
On some systems the startup time for all those bash processes was a
considerable portion of the total boot time.

Note: It's not enough to make sure no CGI scripts are being run with
/bin/bash.  You also need to make sure no bash processes are being launched
by other scripts, since many scripting languages launch a shell to run
external commands.  Unless the environment is explicitly cleared these are
likely to inherit the environment of the calling process, with all the
nasties in it.

--
D. Brodbeck
System Administrator, Linguistics
University of Washington
GPG key fingerprint: 0DB7 4B50 8910 DBC5 B510 79C4 3970 2BC3 2078 D875
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread The Outsider
There are a lot of tools depending on bash. Including virusscanners and 
spamfilters.


The openCSW bash installs into another directory then the "real"/old  bash. 
How can you change the old bash with the openCSW bash?


I saw that solaris 11.2 supports a lot of (old) sparc hardware. And most of 
the ever produced X86 servers. Supportcontracts are  reasonable priced i 
think. Aspecialy in this situation...





On 6 oktober 2014 19:28:00 David Brodbeck  wrote:


On Thu, Oct 2, 2014 at 8:12 AM, Alan Coopersmith <
alan.coopersm...@oracle.com> wrote:

> On 10/ 2/14 07:00 AM, Brandon Hume wrote:
>
>> On many (most?  all?) Linuxes, /bin/sh *is* /bin/bash.
>>
>
> Many, but not all - the Debian family and some others use a lighter weight,
> POSIX compatible shell instead, dash, the Debian Almquist Shell; and many
> embedded distros use BusyBox instead.
>
> https://en.wikipedia.org/wiki/Almquist_shell
> http://lwn.net/Articles/343924/



A big driver of this was faster boot, since boot scripts run on /bin/sh.
On some systems the startup time for all those bash processes was a
considerable portion of the total boot time.

Note: It's not enough to make sure no CGI scripts are being run with
/bin/bash.  You also need to make sure no bash processes are being launched
by other scripts, since many scripting languages launch a shell to run
external commands.  Unless the environment is explicitly cleared these are
likely to inherit the environment of the calling process, with all the
nasties in it.

--
D. Brodbeck
System Administrator, Linguistics
University of Washington
GPG key fingerprint: 0DB7 4B50 8910 DBC5 B510 79C4 3970 2BC3 2078 D875
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread David Brodbeck
On Thu, Oct 2, 2014 at 8:12 AM, Alan Coopersmith <
alan.coopersm...@oracle.com> wrote:

> On 10/ 2/14 07:00 AM, Brandon Hume wrote:
>
>> On many (most?  all?) Linuxes, /bin/sh *is* /bin/bash.
>>
>
> Many, but not all - the Debian family and some others use a lighter weight,
> POSIX compatible shell instead, dash, the Debian Almquist Shell; and many
> embedded distros use BusyBox instead.
>
> https://en.wikipedia.org/wiki/Almquist_shell
> http://lwn.net/Articles/343924/



A big driver of this was faster boot, since boot scripts run on /bin/sh.
On some systems the startup time for all those bash processes was a
considerable portion of the total boot time.

Note: It's not enough to make sure no CGI scripts are being run with
/bin/bash.  You also need to make sure no bash processes are being launched
by other scripts, since many scripting languages launch a shell to run
external commands.  Unless the environment is explicitly cleared these are
likely to inherit the environment of the calling process, with all the
nasties in it.

-- 
D. Brodbeck
System Administrator, Linguistics
University of Washington
GPG key fingerprint: 0DB7 4B50 8910 DBC5 B510 79C4 3970 2BC3 2078 D875
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread Udo Grabowski (IMK)

On 06/10/2014 14:54, Cal Sawyer wrote:

...
If the only solutions being offered after nearly 2 weeks are a) use ksh because bash is 
somehow inferior (shades of "csh-is-deterimental") or 2. rebuild bash youself 
from source, i'd have to say that imho it's the polar opposite and this appears to be 
confirmed in Andreas's post.


The simple fact is: The /dev maintainer(s?) seem to have silently
resigned without handing over the keys
So no one is left who actually can apply and distribute the
patch (which shouldn't be that difficult, as it's only one package);
the /hipster community up to now has served only itself for the
purpose of porting the complete OI userland to gcc, and now, as
the pressure is rising, is trying to reorganise to take over /dev
to actually make stable and useable production releases.
This will take time, but I'm completely with you that a patch
for /dev/ should be made available as fast as possible, so the very
first task is to actually get access to the /dev/ infrastructure
to get at least something started.
--
Dr.Udo Grabowski   Inst.f.Meteorology & Climate Research IMK-ASF-SAT
http://www.imk-asf.kit.edu/english/sat.php
KIT - Karlsruhe Institute of Technology   http://www.kit.edu
Postfach 3640,76021 Karlsruhe,Germany T:(+49)721 608-26026 F:-926026

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread Cal Sawyer

Per openindiana.org:

"OpenIndiana is a robust enterprise operating system"

If the only solutions being offered after nearly 2 weeks are a) use ksh because bash is 
somehow inferior (shades of "csh-is-deterimental") or 2. rebuild bash youself 
from source, i'd have to say that imho it's the polar opposite and this appears to be 
confirmed in Andreas's post.

OmniOS had, as did virtually world+dog, a patch out the day after the bug was 
announced - which is consistent with a/proper/  distribution, and it's where 
i'm going now

- cal sawyer (on oi_151a8)

2014-10-03 11:55 GMT+02:00 Andreas Wacknitz:


What most people don?t understand is that OpenIndiana is YOURS.
OpenIndiana is just a name with no company behind.
If you want something and nobody else is doing it then do it by yourself.
So instead of taking notes you should start acting.



I know. But it looks like openindiana at the moment hasn't got the
community momentum necessary to keep up with security issues. No blame to
anyone, but one has to keep it into account if using in a production
environment.


-- Frank Van Damme Make everything as simple as possible, but not 
simpler. - Albert Einstein




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread Frank Van Damme
2014-10-06 9:31 GMT+02:00 Frank Van Damme :

> 2014-10-03 11:55 GMT+02:00 Andreas Wacknitz :
>
>> What most people don’t understand is that OpenIndiana is YOURS.
>> OpenIndiana is just a name with no company behind.
>> If you want something and nobody else is doing it then do it by yourself.
>> So instead of taking notes you should start acting.
>
>
>
> I know. But it looks like openindiana at the moment hasn't got the
> community momentum necessary to keep up with security issues. No blame to
> anyone, but one has to keep it into account if using in a production
> environment.
>

FYI, OpenCSW seems to have a more current Bash version on board:
http://www.opencsw.org/package/bash/


-- 
Frank Van Damme
Make everything as simple as possible, but not simpler. - Albert Einstein
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-06 Thread Frank Van Damme
2014-10-03 11:55 GMT+02:00 Andreas Wacknitz :

> What most people don’t understand is that OpenIndiana is YOURS.
> OpenIndiana is just a name with no company behind.
> If you want something and nobody else is doing it then do it by yourself.
> So instead of taking notes you should start acting.



I know. But it looks like openindiana at the moment hasn't got the
community momentum necessary to keep up with security issues. No blame to
anyone, but one has to keep it into account if using in a production
environment.


-- 
Frank Van Damme
Make everything as simple as possible, but not simpler. - Albert Einstein
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-05 Thread Nikola M.

On 10/ 5/14 10:40 PM, Bob Friesenhahn wrote:

On Mon, 6 Oct 2014, Ian Collins wrote:


Bob Friesenhahn wrote:

It is always good to execute 'gmake check' before installing sofware
that comes with a test suite.  Some bash tests seem to fail.


If you check the comments printed by the tests, it looks like the 
"failures" seen on Solaris based OS are expected.


Under OpenIndiana I saw some differences in output which may be due to 
small issues with internationalized character sets ("locales"). 
OpenIndiana uses different internationalization code than "Solaris" 
since it was written from scratch by the Illumos project.

Yeah as I understand it was closed source/proprietary part in Opensolaris.


The bash I built (4.3.29) seems to be working fine for my purposes but 
I don't use bash as an interactive shell.
You can post a bug on OI for that internationalization issue, it is 
always useful to have something like that described in detail in bug report.




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-05 Thread Bob Friesenhahn

On Mon, 6 Oct 2014, Ian Collins wrote:


Bob Friesenhahn wrote:

It is always good to execute 'gmake check' before installing sofware
that comes with a test suite.  Some bash tests seem to fail.


If you check the comments printed by the tests, it looks like the "failures" 
seen on Solaris based OS are expected.


Under OpenIndiana I saw some differences in output which may be due to 
small issues with internationalized character sets ("locales"). 
OpenIndiana uses different internationalization code than "Solaris" 
since it was written from scratch by the Illumos project.


The bash I built (4.3.29) seems to be working fine for my purposes but 
I don't use bash as an interactive shell.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-05 Thread Ian Collins

Bob Friesenhahn wrote:

It is always good to execute 'gmake check' before installing sofware
that comes with a test suite.  Some bash tests seem to fail.


If you check the comments printed by the tests, it looks like the 
"failures" seen on Solaris based OS are expected.


I've been using 4.1.15 build on Solaris 10 for most systems.

--
Ian.


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-05 Thread Roelof van der Wal
The -07 version of the solaris 10 Oracle patch is from last monday. Seems 
to me it fixes all. But had little time to test it.



On 2 oktober 2014 17:24:00 Alan Coopersmith  
wrote:



On 10/ 2/14 07:20 AM, Bob Friesenhahn wrote:
> On Thu, 2 Oct 2014, Brandon Hume wrote:
>
>> On 26/09/2014 8:47 PM, Gary Gendel wrote:
>>> The current maintainer says it's been in bash for ~20 years, why it's 
not in

>>> Solaris 10 is a mystery.
>>
>> It is in Solaris 10.  (And 11.)  The test being used is flawed:
>>
>>   env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
>
> The good news is that if you have a support contract, there is a Solaris 
10 bash
> patch which seems to solve all the reported attack vectors (in my own 
testing).

> It took Oracle two patches to get things right.

People found more bugs after the first patch went out.   There are 6 CVE's for
bash announced in the last week after all.

--
-Alan Coopersmith-  alan.coopersm...@oracle.com
 Oracle Solaris Engineering - http://blogs.oracle.com/alanc

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-04 Thread cpforum







> Message du 04/10/14 17:28
> De : "Bob Friesenhahn" 
> A : "Discussion list for OpenIndiana" 
> Copie à : 
> Objet : Re: [OpenIndiana-discuss] Bash bug issue
> 

> 
> ksh provided by OpenIndiana is also outdated and broken. :-(

> 
> Your instructions are useful.
> 
> It is always good to execute 'gmake check' before installing sofware 
> that comes with a test suite. Some bash tests seem to fail.
> 
> Bob

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-04 Thread Bob Friesenhahn

On Sat, 4 Oct 2014, cpforum wrote:


First : building openindiana a10 with updated commands (including a secure 
bash) urge :-)

Second : because ksh is ten time powerfull and reliable than bash 
leave bash and adopt ksh. If you want history put ' set -o emacs' 
inside your .profile


ksh provided by OpenIndiana is also outdated and broken. :-(

Your instructions are useful.

It is always good to execute 'gmake check' before installing sofware 
that comes with a test suite.  Some bash tests seem to fail.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-04 Thread cpforum
First : building openindiana a10 with updated commands (including a secure 
bash) urge :-)

Second : because ksh is ten time powerfull and reliable than bash leave bash 
and adopt ksh. If you want history put ' set -o emacs' inside your .profile
For exemple ksh can be compiled (shcomp), has object oriented programming 
features and many other features bash has'nt.

Third : while waiting for openindiana a10 compile bash. It takes 15 minutes.

Get bash and patch from ftp.gnu.org/gnu/bash


$ ls 
bash-4.3 bash43-007.sig bash43-015.sig bash43-023.sig
bash-4.3.tar.gz bash43-008 bash43-016 bash43-024
bash-4.3.tar.gz.sig bash43-008.sig bash43-016.sig bash43-024.sig
bash43-001 bash43-009 bash43-017 bash43-025
bash43-001.sig bash43-009.sig bash43-017.sig bash43-025.sig
bash43-002 bash43-010 bash43-018 bash43-026
bash43-002.sig bash43-010.sig bash43-018.sig bash43-026.sig
bash43-003 bash43-011 bash43-019 bash43-027
bash43-003.sig bash43-011.sig bash43-019.sig bash43-027.sig
bash43-004 bash43-012 bash43-020 bash43-028
bash43-004.sig bash43-012.sig bash43-020.sig bash43-028.sig
bash43-005 bash43-013 bash43-021 bash43-029
bash43-005.sig bash43-013.sig bash43-021.sig bash43-029.sig
bash43-006 bash43-014 bash43-022
bash43-006.sig bash43-014.sig bash43-022.sig
bash43-007 bash43-015 bash43-023

Go under ksh Important for {1-29%03d}

$ ksh 

$ cd bash-4.3

Apply all patch 001 to 029

$ for p in {1..29%03d} <<< ksh is powerfull than bash
> do
> gpatch -p0 < ../bash43-$p
> done


$ ./configure
$ gmake


$ gmake install



/usr/local/bin/bash --version
GNU bash, version 4.3.29(1)-release (i386-pc-solaris2.11)
Copyright (C) 2013 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later 

This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.


/usr/local/bin/bash
Verify it's OK

Then

cd /usr/bin

mv bash bash-oi_151a9

ln -s /usr/local/bin/bash bash

> Message du 02/10/14 17:13
> De : "Alan Coopersmith" 
> A : "Discussion list for OpenIndiana" 
> Copie à : 
> Objet : Re: [OpenIndiana-discuss] Bash bug issue
> 
> On 10/ 2/14 07:00 AM, Brandon Hume wrote:
> > On many (most? all?) Linuxes, /bin/sh *is* /bin/bash.
> 
> Many, but not all - the Debian family and some others use a lighter weight,
> POSIX compatible shell instead, dash, the Debian Almquist Shell; and many
> embedded distros use BusyBox instead.
> 
> https://en.wikipedia.org/wiki/Almquist_shell
> http://lwn.net/Articles/343924/
> 
> -- 
> -Alan Coopersmith- alan.coopersm...@oracle.com
> Oracle Solaris Engineering - http://blogs.oracle.com/alanc
> 
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-03 Thread Andreas Wacknitz

Am 03.10.2014 um 11:49 schrieb Frank Van Damme :

> 2014-10-02 1:06 GMT+02:00 Bob Friesenhahn :
> 
>> I am not sure who has the ability to build and update OpenIndiana
>> packages, but it will be really really bad for the future of OpenIndiana if
>> it fails to supply a fixed version of its bash package.
> 
> 
> I have only one system running OpenIndiana, not a webserver. This little
> bug indeed makes one wonder if OpenIndiana ever pays any attention to
> security at all. Looks like there's no one home at
> http://openindiana.org/support/security-advisories/ ...
> 
> Note taken.
> 
What most people don’t understand is that OpenIndiana is YOURS.
OpenIndiana is just a name with no company behind.
If you want something and nobody else is doing it then do it by yourself.
So instead of taking notes you should start acting.

Andreas
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-03 Thread Frank Van Damme
2014-10-02 1:06 GMT+02:00 Bob Friesenhahn :

> I am not sure who has the ability to build and update OpenIndiana
> packages, but it will be really really bad for the future of OpenIndiana if
> it fails to supply a fixed version of its bash package.


I have only one system running OpenIndiana, not a webserver. This little
bug indeed makes one wonder if OpenIndiana ever pays any attention to
security at all. Looks like there's no one home at
http://openindiana.org/support/security-advisories/ ...

Note taken.

-- 
Frank Van Damme
Make everything as simple as possible, but not simpler. - Albert Einstein
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-02 Thread Alan Coopersmith

On 10/ 2/14 01:37 PM, outsider wrote:

It is very strange with the oracle updates for Solaris 10 & 11

Is far as I can see, Solaris 10 and Solaris 11 get different bash versions
after the patch.


They had different bash versions before the patch too.  Upstream released
fixes for bash versions from 2.0 to 4.3, so that distros/packagers weren't
forced to update to the latest just to get the fixes.

There is nothing strange here, just don't expect to have the same
software versions in two OS's released 7 years apart.

--
-Alan Coopersmith-  alan.coopersm...@oracle.com
 Oracle Solaris Engineering - http://blogs.oracle.com/alanc

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-02 Thread outsider
It is very strange with the oracle updates for Solaris 10 & 11

Is far as I can see, Solaris 10 and Solaris 11 get different bash versions
after the patch. 
I don't know what is allowed to say about it in public, but both test
negative on the (simple) shockshell tests I found. 
(so they seem secured) 







-Oorspronkelijk bericht-
Van: Alan Coopersmith [mailto:alan.coopersm...@oracle.com] 
Verzonden: donderdag 2 oktober 2014 17:10
Aan: Discussion list for OpenIndiana
Onderwerp: Re: [OpenIndiana-discuss] Bash bug issue

On 10/ 2/14 07:20 AM, Bob Friesenhahn wrote:
> On Thu, 2 Oct 2014, Brandon Hume wrote:
>
>> On 26/09/2014 8:47 PM, Gary Gendel wrote:
>>> The current maintainer says it's been in bash for ~20 years, why 
>>> it's not in Solaris 10 is a mystery.
>>
>> It is in Solaris 10.  (And 11.)  The test being used is flawed:
>>
>>   env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
>
> The good news is that if you have a support contract, there is a 
> Solaris 10 bash patch which seems to solve all the reported attack vectors
(in my own testing).
> It took Oracle two patches to get things right.

People found more bugs after the first patch went out.   There are 6 CVE's
for
bash announced in the last week after all.

-- 
-Alan Coopersmith-  alan.coopersm...@oracle.com
 Oracle Solaris Engineering - http://blogs.oracle.com/alanc

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-02 Thread Alan Coopersmith

On 10/ 2/14 07:00 AM, Brandon Hume wrote:

On many (most?  all?) Linuxes, /bin/sh *is* /bin/bash.


Many, but not all - the Debian family and some others use a lighter weight,
POSIX compatible shell instead, dash, the Debian Almquist Shell; and many
embedded distros use BusyBox instead.

https://en.wikipedia.org/wiki/Almquist_shell
http://lwn.net/Articles/343924/

--
-Alan Coopersmith-  alan.coopersm...@oracle.com
 Oracle Solaris Engineering - http://blogs.oracle.com/alanc

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-02 Thread Alan Coopersmith

On 10/ 2/14 07:20 AM, Bob Friesenhahn wrote:

On Thu, 2 Oct 2014, Brandon Hume wrote:


On 26/09/2014 8:47 PM, Gary Gendel wrote:

The current maintainer says it's been in bash for ~20 years, why it's not in
Solaris 10 is a mystery.


It is in Solaris 10.  (And 11.)  The test being used is flawed:

  env X="() { :;} ; echo busted" /bin/sh -c "echo completed"


The good news is that if you have a support contract, there is a Solaris 10 bash
patch which seems to solve all the reported attack vectors (in my own testing).
It took Oracle two patches to get things right.


People found more bugs after the first patch went out.   There are 6 CVE's for
bash announced in the last week after all.

--
-Alan Coopersmith-  alan.coopersm...@oracle.com
 Oracle Solaris Engineering - http://blogs.oracle.com/alanc

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-02 Thread Bob Friesenhahn

On Thu, 2 Oct 2014, Brandon Hume wrote:


On 26/09/2014 8:47 PM, Gary Gendel wrote:
The current maintainer says it's been in bash for ~20 years, why it's not 
in Solaris 10 is a mystery. 


It is in Solaris 10.  (And 11.)  The test being used is flawed:

  env X="() { :;} ; echo busted" /bin/sh -c "echo completed"


The good news is that if you have a support contract, there is a 
Solaris 10 bash patch which seems to solve all the reported attack 
vectors (in my own testing).  It took Oracle two patches to get things 
right.


The obvious replacement for Solaris 10 has been OpenIndiana but 
unfortunately, OpenIndiana has not been issuing any fixes for even the 
most high-profile security issues (like this one).


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-02 Thread Brandon Hume

On 26/09/2014 8:47 PM, Gary Gendel wrote:
The current maintainer says it's been in bash for ~20 years, why it's 
not in Solaris 10 is a mystery. 


It is in Solaris 10.  (And 11.)  The test being used is flawed:

   env X="() { :;} ; echo busted" /bin/sh -c "echo completed"

This just tests whether or not /bin/sh is vulnerable, and on Solaris 
/bin/sh != /bin/bash (unless your admin is insane and dropped it in 
place, which can't really be ruled out).  On many (most?  all?) Linuxes, 
/bin/sh *is* /bin/bash.


So Solaris and derivatives have the bug, but the attack surface isn't 
anywhere near as massive as on a Linux distribution.  But if someone has 
written scripts explicitly using /bin/bash, or if you have sudo 
configurations that don't clean out the environment, you can get bitten.

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-02 Thread outsider
 

Has anyone tried to install the patched BASH version of
https://unixpackages.com [1] ? 

It installs to a different location then the OI Bash and gives an error
: 

bash --version 

ld.so.1: bash: fatal: libintl.so.8: open failed: No such file or
directory Killed 

does anyone have a solution for a manual update of bash? 
 

Links:
--
[1] https://unixpackages.com
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-01 Thread Harry Putnam
Bruce Lilly  writes:

> http://lists.research.att.com/pipermail/ast-developers/2014q3/003964.html

Thanks for that... that is encouraging.


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-01 Thread Richard L. Hamilton

On Oct 1, 2014, at 7:06 PM, Bob Friesenhahn  
wrote:

> I am not sure who has the ability to build and update OpenIndiana packages, 
> but it will be really really bad for the future of OpenIndiana if it fails to 
> supply a fixed version of its bash package.
> 
> This article (including many example exploits) was posted on another list:
> 
> http://www.fireeye.com/blog/technical/2014/09/shellshock-in-the-wild.html
> 
> Known exploits include Web CGI, DHCP client, OpenVPN, ssh, gitweb, and 
> (possibly) git service.  Even if the service is implemented in Perl, Python, 
> Java, or C, it may still be exploitable if it exports externally-provided 
> data as environment variables some program it invokes eventually happens to 
> execute bash.
> 
> While bash is not a "native" shell for OpenIndiana, it is quite heavily used. 
>  It is unfortunate that it is often used as a user login shell so it is 
> painful to simply move the existing binary to the side.
> 
> Bob
> -- 
> Bob Friesenhahn
> bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
> GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
> 
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
> 


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-01 Thread Richard L. Hamilton
I’m  in a similar situation: Solaris 11 at home, without support contract.  My 
solution was to install OpenCSW’s updated bash (I had OpenCSW in place anyway), 
move /usr/bin/bash out of the way, and symlink /opt/csw/bin/bash to 
/usr/bin/bash.

Use a copy instead of a symlink if /opt is a separate filesystem!  And remember 
to undo those changes to /usr/bin _before_ installing a properly packaged 
update.

Until Apple released their fix, I did something similar on my Macs using 
MacPorts.

It’s temporary, and all my publicly accessible web servers etc have access 
controls anyway; but until a legitimate update comes along, it’s a lot better 
than nothing.  For Solaris 11, I’ll just have to wait for 11.3 to have an 
official fix without support contract (probably six months or so?).
 
On Oct 1, 2014, at 7:06 PM, Bob Friesenhahn  
wrote:

> I am not sure who has the ability to build and update OpenIndiana packages, 
> but it will be really really bad for the future of OpenIndiana if it fails to 
> supply a fixed version of its bash package.
> 
> This article (including many example exploits) was posted on another list:
> 
> http://www.fireeye.com/blog/technical/2014/09/shellshock-in-the-wild.html
> 
> Known exploits include Web CGI, DHCP client, OpenVPN, ssh, gitweb, and 
> (possibly) git service.  Even if the service is implemented in Perl, Python, 
> Java, or C, it may still be exploitable if it exports externally-provided 
> data as environment variables some program it invokes eventually happens to 
> execute bash.
> 
> While bash is not a "native" shell for OpenIndiana, it is quite heavily used. 
>  It is unfortunate that it is often used as a user login shell so it is 
> painful to simply move the existing binary to the side.
> 
> Bob
> -- 
> Bob Friesenhahn
> bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
> GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
> 
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
> 


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-01 Thread Bob Friesenhahn
I am not sure who has the ability to build and update OpenIndiana 
packages, but it will be really really bad for the future of 
OpenIndiana if it fails to supply a fixed version of its bash package.


This article (including many example exploits) was posted on another 
list:


http://www.fireeye.com/blog/technical/2014/09/shellshock-in-the-wild.html

Known exploits include Web CGI, DHCP client, OpenVPN, ssh, gitweb, and 
(possibly) git service.  Even if the service is implemented in Perl, 
Python, Java, or C, it may still be exploitable if it exports 
externally-provided data as environment variables some program it 
invokes eventually happens to execute bash.


While bash is not a "native" shell for OpenIndiana, it is quite 
heavily used.  It is unfortunate that it is often used as a user login 
shell so it is painful to simply move the existing binary to the side.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-10-01 Thread Bruce Lilly
> So, do you mean that ksh93 does not have the vulnerability?

http://lists.research.att.com/pipermail/ast-developers/2014q3/003964.html

On Tue, Sep 30, 2014 at 10:02 AM, Bob Friesenhahn <
bfrie...@simple.dallas.tx.us> wrote:

> On Tue, 30 Sep 2014, Jim Klimov wrote:
>
>>
>> Maybe a stupid question on my side (sorry i'm overwhelmed with relocation
>> and other life events), but how really is this bug exploitable? Especially
>> on Solaris and illumos systems with sh/ksh by default and assumed no
>> scripted CGI (hosts of native or java sourced web-code though) ?
>>
>
> It is readily exploitable for web CGI scripts which provide/export values
> provided by the web server and remote client as environment variables.  The
> "CGI" paradigm has thoroughly permiated web application infrastructures.
> The exploit requires that bash be executed with the problematic environment
> variables already set. Service applications obtained from Linux often
> require bash in order to run.
>
> On my own systems, the only service I found which was suspect was 'git'
> and 'gitweb.cgi' since the 'git' implementation depends on many shell
> scripts, which specifically depend on bash.
>
> For example, this is output from the test-cgi script provided with Apache:
>
> CGI/1.0 test script report:
>
> argc is 0. argv is .
>
> SERVER_SOFTWARE = Apache/2.0.63 (Unix) DAV/2
> SERVER_NAME = www.simplesystems.org
> GATEWAY_INTERFACE = CGI/1.1
> SERVER_PROTOCOL = HTTP/1.1
> SERVER_PORT = 80
> REQUEST_METHOD = GET
> HTTP_ACCEPT = text/html,application/xhtml+xml,application/xml;q=0.9,*/*;
> q=0.8
> PATH_INFO =
> PATH_TRANSLATED =
> SCRIPT_NAME = /cgi-bin/test-cgi
> QUERY_STRING =
> REMOTE_HOST =
> REMOTE_ADDR = 65.66.245.66
> REMOTE_USER =
> AUTH_TYPE =
> CONTENT_TYPE =
> CONTENT_LENGTH =
>
> and this is output from a Perl script called 'printenv' which prints
> everything made available:
>
> DOCUMENT_ROOT="/html"
> GATEWAY_INTERFACE="CGI/1.1"
> HTTP_ACCEPT="text/html,application/xhtml+xml,
> application/xml;q=0.9,*/*;q=0.8"
> HTTP_ACCEPT_ENCODING="gzip, deflate"
> HTTP_ACCEPT_LANGUAGE="en-US,en;q=0.5"
> HTTP_CONNECTION="keep-alive"
> HTTP_HOST="www.simplesystems.org"
> HTTP_USER_AGENT="Mozilla/5.0 (X11; SunOS i86pc; rv:30.0) Gecko/20100101
> Firefox/30.0"
> PATH="/usr/sbin:/usr/bin"
> QUERY_STRING=""
> REMOTE_ADDR="65.66.245.66"
> REMOTE_PORT="53877"
> REQUEST_METHOD="GET"
> REQUEST_URI="/cgi-bin/printenv"
> SCRIPT_FILENAME="/var/apache2/cgi-bin/printenv"
> SCRIPT_NAME="/cgi-bin/printenv"
> SERVER_ADDR="65.66.246.89"
> SERVER_ADMIN="webma...@simplesystems.org"
> SERVER_NAME="www.simplesystems.org"
> SERVER_PORT="80"
> SERVER_PROTOCOL="HTTP/1.1"
> SERVER_SIGNATURE="Apache/2.0.63 (Unix) DAV/2 Server at
> www.simplesystems.org Port 80\n"
> SERVER_SOFTWARE="Apache/2.0.63 (Unix) DAV/2"
> TZ="US/Central"
> UNIQUE_ID="rExdoEFC9koAAEJpoxgJ"
>
> --
> Bob Friesenhahn
> bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
> GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
>
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-30 Thread Bob Friesenhahn

On Tue, 30 Sep 2014, Jim Klimov wrote:


Maybe a stupid question on my side (sorry i'm overwhelmed with 
relocation and other life events), but how really is this bug 
exploitable? Especially on Solaris and illumos systems with sh/ksh 
by default and assumed no scripted CGI (hosts of native or java 
sourced web-code though) ?


It is readily exploitable for web CGI scripts which provide/export 
values provided by the web server and remote client as environment 
variables.  The "CGI" paradigm has thoroughly permiated web 
application infrastructures.  The exploit requires that bash be 
executed with the problematic environment variables already set. 
Service applications obtained from Linux often require bash in order 
to run.


On my own systems, the only service I found which was suspect was 
'git' and 'gitweb.cgi' since the 'git' implementation depends on many 
shell scripts, which specifically depend on bash.


For example, this is output from the test-cgi script provided with 
Apache:


CGI/1.0 test script report:

argc is 0. argv is .

SERVER_SOFTWARE = Apache/2.0.63 (Unix) DAV/2
SERVER_NAME = www.simplesystems.org
GATEWAY_INTERFACE = CGI/1.1
SERVER_PROTOCOL = HTTP/1.1
SERVER_PORT = 80
REQUEST_METHOD = GET
HTTP_ACCEPT = text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
PATH_INFO =
PATH_TRANSLATED =
SCRIPT_NAME = /cgi-bin/test-cgi
QUERY_STRING =
REMOTE_HOST =
REMOTE_ADDR = 65.66.245.66
REMOTE_USER =
AUTH_TYPE =
CONTENT_TYPE =
CONTENT_LENGTH =

and this is output from a Perl script called 'printenv' which prints 
everything made available:


DOCUMENT_ROOT="/html"
GATEWAY_INTERFACE="CGI/1.1"
HTTP_ACCEPT="text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
HTTP_ACCEPT_ENCODING="gzip, deflate"
HTTP_ACCEPT_LANGUAGE="en-US,en;q=0.5"
HTTP_CONNECTION="keep-alive"
HTTP_HOST="www.simplesystems.org"
HTTP_USER_AGENT="Mozilla/5.0 (X11; SunOS i86pc; rv:30.0) 
Gecko/20100101 Firefox/30.0"

PATH="/usr/sbin:/usr/bin"
QUERY_STRING=""
REMOTE_ADDR="65.66.245.66"
REMOTE_PORT="53877"
REQUEST_METHOD="GET"
REQUEST_URI="/cgi-bin/printenv"
SCRIPT_FILENAME="/var/apache2/cgi-bin/printenv"
SCRIPT_NAME="/cgi-bin/printenv"
SERVER_ADDR="65.66.246.89"
SERVER_ADMIN="webma...@simplesystems.org"
SERVER_NAME="www.simplesystems.org"
SERVER_PORT="80"
SERVER_PROTOCOL="HTTP/1.1"
SERVER_SIGNATURE="Apache/2.0.63 (Unix) DAV/2 Server at www.simplesystems.org Port 
80\n"
SERVER_SOFTWARE="Apache/2.0.63 (Unix) DAV/2"
TZ="US/Central"
UNIQUE_ID="rExdoEFC9koAAEJpoxgJ"

--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-30 Thread Jonathan Adams
We have tested all our systems, and the only ones that were vulnerable (in
cgi-bin) were ones that we had put in a bash script to test.

if you don't have any bash scripts in your cgi-bin, and your default system
shll is not bash (and on Solaris, and Ubuntu it isn't) then you pretty much
aren't exploitable via a web-server.

there are possible issues if you have restricted users/remote logons ... if
the user has the bash shell as their default it is possible to escape from
the restricted environment.

e.g. http://troy.jdmz.net/rsync/index.html

where you have a "validate-rsync" procedure that checks if you are
connecting with the command rsync ...

(the easiest way to fix the above is to create an rsyncd server and connect
to that, rather than ssh'ing)

also, although it's annoying you probably want to go around and delete all
your "authorized_keys" files so that you cannot ssh in without a password.

I'm not sure, but I've been told that github/heroku use bash for the shells
that they allow remote connections on, I don't know if they are exploitable
remotely, but I don't really want to check that out :)

remember that you can only use this bug to run commands as the user who is
logged on ... if the person knows the username and password already then
they can just run the command straight.

Jon

On 30 September 2014 09:40, Jim Klimov  wrote:

> 29 сентября 2014 г. 17:46:20 CEST, Jason Matthews 
> пишет:
> >paraphrasing "Joshua" from "WarGames," bash is a strange game where the
> >only winning move is not to play.
> >
> >J.
> >
> >Sent from my iPhone
> >
> >> On Sep 29, 2014, at 2:43 AM, "Udo Grabowski (IMK)"
> > wrote:
> >>
> >> As predicted, there's more bash horror (Score 11):
> >
> >___
> >openindiana-discuss mailing list
> >openindiana-discuss@openindiana.org
> >http://openindiana.org/mailman/listinfo/openindiana-discuss
>
> Maybe a stupid question on my side (sorry i'm overwhelmed with relocation
> and other life events), but how really is this bug exploitable? Especially
> on Solaris and illumos systems with sh/ksh by default and assumed no
> scripted CGI (hosts of native or java sourced web-code though) ?
>
> I mean, from what I gather, the bug allows to execute unexpected code with
> credentials of the user that executes bash. On a local system someone
> should already have a login to do that (or a hacked backdoor), so may have
> other means for doing mischief. Can it be used to elevate? How? Via config
> files for root-executed initscripts and cronjobs? If these are editable by
> a random untrustworthy user, the system is already busted without the bug...
>
> I kinda get the point about web-scripts especially where system programs
> can be called with the default shell of the webserver account (bash for
> some), although did not really grasp from cursory looks at the articles
> just how the env-function can be passed via http requests to do the
> exploit. Let's assume it can be done... as protection/precaution, would it
> suffice to make sure that apache's and such do not use bash in their
> /etc/passwd fields (and restart the daemons)?
>
> Also, did anyone (beside Oracle) already build and publish a replacement
> SUNWbash for legacy Solaris 8-10 systems? ;)
>
> Thanks, Jim
> --
> Typos courtesy of K-9 Mail on my Samsung Android
>
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-30 Thread Jim Klimov
29 сентября 2014 г. 17:46:20 CEST, Jason Matthews  пишет:
>paraphrasing "Joshua" from "WarGames," bash is a strange game where the
>only winning move is not to play. 
>
>J. 
>
>Sent from my iPhone
>
>> On Sep 29, 2014, at 2:43 AM, "Udo Grabowski (IMK)"
> wrote:
>> 
>> As predicted, there's more bash horror (Score 11):
>
>___
>openindiana-discuss mailing list
>openindiana-discuss@openindiana.org
>http://openindiana.org/mailman/listinfo/openindiana-discuss

Maybe a stupid question on my side (sorry i'm overwhelmed with relocation and 
other life events), but how really is this bug exploitable? Especially on 
Solaris and illumos systems with sh/ksh by default and assumed no scripted CGI 
(hosts of native or java sourced web-code though) ?

I mean, from what I gather, the bug allows to execute unexpected code with 
credentials of the user that executes bash. On a local system someone should 
already have a login to do that (or a hacked backdoor), so may have other means 
for doing mischief. Can it be used to elevate? How? Via config files for 
root-executed initscripts and cronjobs? If these are editable by a random 
untrustworthy user, the system is already busted without the bug...

I kinda get the point about web-scripts especially where system programs can be 
called with the default shell of the webserver account (bash for some), 
although did not really grasp from cursory looks at the articles just how the 
env-function can be passed via http requests to do the exploit. Let's assume it 
can be done... as protection/precaution, would it suffice to make sure that 
apache's and such do not use bash in their /etc/passwd fields (and restart the 
daemons)?

Also, did anyone (beside Oracle) already build and publish a replacement 
SUNWbash for legacy Solaris 8-10 systems? ;)

Thanks, Jim
--
Typos courtesy of K-9 Mail on my Samsung Android

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-29 Thread Jason Matthews
paraphrasing "Joshua" from "WarGames," bash is a strange game where the only 
winning move is not to play. 

J. 

Sent from my iPhone

> On Sep 29, 2014, at 2:43 AM, "Udo Grabowski (IMK)"  
> wrote:
> 
> As predicted, there's more bash horror (Score 11):

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-29 Thread Udo Grabowski (IMK)

On 25/09/2014 10:42, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/

does anyone know if this affects us?


As predicted, there's more bash horror (Score 11):

--
Dr.Udo Grabowski   Inst.f.Meteorology & Climate Research IMK-ASF-SAT
http://www.imk-asf.kit.edu/english/sat.php
KIT - Karlsruhe Institute of Technology   http://www.kit.edu
Postfach 3640,76021 Karlsruhe,Germany T:(+49)721 608-26026 F:-926026

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-28 Thread Bob Friesenhahn
Hopefully some kind person with necessary knowlege and access will 
push an updated bash package which works on 151a8/9 so that servers 
based on OpenIndiana are no longer a disaster situation.  It might be 
necessary to do this a few times until an official proper cure is 
posted.


One service I found (self-compiled in my case) which seemed to be 
riddled with bash is git service and git web since git uses many shell 
scripts as part of its implementation and chooses bash.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-27 Thread Nemo
On 26 September 2014 20:04, Saso Kiselkov  wrote:
> The invoking shell is irrelevant. Here's your problem:
>
>vvv
> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
>^^^
>
> Put bash in there and you'll get a vulnerable "busted" result.

Of course, thank you, I never noticed that I was runing /bin/sh, not /bin/bash.

Moral of the story:  Neverl operate heavy machinery or shell scripts when tired.

N.

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Saso Kiselkov
On 9/27/14, 1:59 AM, Nemo wrote:
> On 26 September 2014 19:44, Saso Kiselkov  wrote:
>> On 9/27/14, 1:41 AM, Nemo wrote:
> [...]
>>> Whence does the OI bash source originate?  On the bash that comes with
>>> Solaris 10,  the vulnerability is not present:
>>>
>>> [~]=> bash --version
>>> GNU bash, version 3.00.16(1)-release (sparc-sun-solaris2.10)
>>> Copyright (C) 2004 Free Software Foundation, Inc.
>>> [~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
>>> completed
>>
>> In general, bash != /bin/sh on either Solaris or Illumos-derived
>> systems. Rerun the env test with bash instead of /bin/sh.
> 
> [~]=> echo $SHELL
> /bin/bash
> [~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
> completed
> 
> Note that I put bash into /bin to avoid GNUisms.

The invoking shell is irrelevant. Here's your problem:

   vvv
env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
   ^^^

Put bash in there and you'll get a vulnerable "busted" result.

-- 
Saso

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Bill Sommerfeld
On 09/26/14 16:59, Nemo wrote:
> [~]=> echo $SHELL
> /bin/bash
> [~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
> completed
> 
> Note that I put bash into /bin to avoid GNUisms.

Try:

$ env X="() { :;} ; echo busted" /bin/bash -c "echo completed"

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Nemo
On 26 September 2014 19:47, Gary Gendel  wrote:
> The current maintainer says it's been in bash for ~20 years, why it's not in
> Solaris 10 is a mystery.

If you which files, I can dig out the source from the companion disc
and compare.

N.

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Nemo
On 26 September 2014 19:44, Saso Kiselkov  wrote:
> On 9/27/14, 1:41 AM, Nemo wrote:
[...]
>> Whence does the OI bash source originate?  On the bash that comes with
>> Solaris 10,  the vulnerability is not present:
>>
>> [~]=> bash --version
>> GNU bash, version 3.00.16(1)-release (sparc-sun-solaris2.10)
>> Copyright (C) 2004 Free Software Foundation, Inc.
>> [~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
>> completed
>
> In general, bash != /bin/sh on either Solaris or Illumos-derived
> systems. Rerun the env test with bash instead of /bin/sh.

[~]=> echo $SHELL
/bin/bash
[~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
completed

Note that I put bash into /bin to avoid GNUisms.

N.

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Gary Gendel
The current maintainer says it's been in bash for ~20 years, why it's 
not in Solaris 10 is a mystery.


On 9/26/14, 7:41 PM, Nemo wrote:

On 26 September 2014 17:02, Harry Putnam  wrote:

Gary Gendel  writes:


I believe we mostly skirt the issue because, unlike Linux, the default
shell (/bin/sh) is ksh93 not bash.  This means that under normal
conditions we shouldn't have an issue.  Only if your cgi scripts
actually request bash will apache be a problem.  As for ssh, it
depends upon the login shell for the user.

So, do you mean that ksh93 does not have the vulnerability?

Whence does the OI bash source originate?  On the bash that comes with
Solaris 10,
the vulnerability is not present:

[~]=> bash --version
GNU bash, version 3.00.16(1)-release (sparc-sun-solaris2.10)
Copyright (C) 2004 Free Software Foundation, Inc.
[~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
completed


N.

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Saso Kiselkov
On 9/27/14, 1:41 AM, Nemo wrote:
> On 26 September 2014 17:02, Harry Putnam  wrote:
>> Gary Gendel  writes:
>>
>>> I believe we mostly skirt the issue because, unlike Linux, the default
>>> shell (/bin/sh) is ksh93 not bash.  This means that under normal
>>> conditions we shouldn't have an issue.  Only if your cgi scripts
>>> actually request bash will apache be a problem.  As for ssh, it
>>> depends upon the login shell for the user.
>>
>> So, do you mean that ksh93 does not have the vulnerability?
> 
> Whence does the OI bash source originate?  On the bash that comes with
> Solaris 10,
> the vulnerability is not present:
> 
> [~]=> bash --version
> GNU bash, version 3.00.16(1)-release (sparc-sun-solaris2.10)
> Copyright (C) 2004 Free Software Foundation, Inc.
> [~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
> completed

In general, bash != /bin/sh on either Solaris or Illumos-derived
systems. Rerun the env test with bash instead of /bin/sh.

-- 
Saso


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Nemo
On 26 September 2014 17:02, Harry Putnam  wrote:
> Gary Gendel  writes:
>
>> I believe we mostly skirt the issue because, unlike Linux, the default
>> shell (/bin/sh) is ksh93 not bash.  This means that under normal
>> conditions we shouldn't have an issue.  Only if your cgi scripts
>> actually request bash will apache be a problem.  As for ssh, it
>> depends upon the login shell for the user.
>
> So, do you mean that ksh93 does not have the vulnerability?

Whence does the OI bash source originate?  On the bash that comes with
Solaris 10,
the vulnerability is not present:

[~]=> bash --version
GNU bash, version 3.00.16(1)-release (sparc-sun-solaris2.10)
Copyright (C) 2004 Free Software Foundation, Inc.
[~]=> env X="() { :;} ; echo busted" /bin/sh -c "echo completed"
completed


N.

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-26 Thread Harry Putnam
Gary Gendel  writes:

> I believe we mostly skirt the issue because, unlike Linux, the default
> shell (/bin/sh) is ksh93 not bash.  This means that under normal
> conditions we shouldn't have an issue.  Only if your cgi scripts
> actually request bash will apache be a problem.  As for ssh, it
> depends upon the login shell for the user.

So, do you mean that ksh93 does not have the vulnerability?



___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Jonathan Adams
I know I created the original post that sparked this debate, but I have to
say that we've been checking our servers all day, and we cannot get any of
them to act compromised ... we don't use bash scripts in our cgi-bin and
nothing seems to try to run bash at all (fuser `which bash` only returns my
shells)

The ssh things could be an issue, but we're nuking all ssh authorized_keys
wherever we find them, and we don't have accounts restricted to running
specific applications via ssh, so the users who can ssh in should know what
they're doing, or not know so much that they aren't a threat.

I do have bash scripts on our system that users run manually, but that is
because the old Solaris 10 /bin/sh is brain-dead, csh is a nasty piece of
work for scripting and ksh scripts don't seem as portable to Linux/old
Solaris boxes.

Jon

On 25 September 2014 18:18, Gary Gendel  wrote:

> I believe we mostly skirt the issue because, unlike Linux, the default
> shell (/bin/sh) is ksh93 not bash.  This means that under normal conditions
> we shouldn't have an issue.  Only if your cgi scripts actually request bash
> will apache be a problem.  As for ssh, it depends upon the login shell for
> the user.
>
> On 09/25/2014 01:04 PM, Tim Mooney wrote:
>
>> In regard to: Re: [OpenIndiana-discuss] Bash bug issue, Bob
>> Friesenhahn...:
>>
>>  Unfortunately, 'dash' is not completely compatible with scripts written
>>> for 'bash'.  It is not clear to my why people write shell scripts targeting
>>> bash, but it seems to happen often.
>>>
>>
>> Two reasons:
>>
>> - It's the "all the world's a VAX" syndrome for the current generation.
>>
>> - bash (and ksh) do provide some handy features that traditional Bourne
>>   shell does not, and for a large portion of inexperienced programmers,
>>   convenience/laziness trumps portability
>>
>> Both things drive me crazy, but they've been going on for my entire
>> career in computing, so I have no reason to expect that either are going
>> to ever disappear.
>>
>> Tim
>>
>
>
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Gary Gendel
I believe we mostly skirt the issue because, unlike Linux, the default 
shell (/bin/sh) is ksh93 not bash.  This means that under normal 
conditions we shouldn't have an issue.  Only if your cgi scripts 
actually request bash will apache be a problem.  As for ssh, it depends 
upon the login shell for the user.


On 09/25/2014 01:04 PM, Tim Mooney wrote:
In regard to: Re: [OpenIndiana-discuss] Bash bug issue, Bob 
Friesenhahn...:


Unfortunately, 'dash' is not completely compatible with scripts 
written for 'bash'.  It is not clear to my why people write shell 
scripts targeting bash, but it seems to happen often.


Two reasons:

- It's the "all the world's a VAX" syndrome for the current generation.

- bash (and ksh) do provide some handy features that traditional Bourne
  shell does not, and for a large portion of inexperienced programmers,
  convenience/laziness trumps portability

Both things drive me crazy, but they've been going on for my entire
career in computing, so I have no reason to expect that either are going
to ever disappear.

Tim



___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Tim Mooney

In regard to: Re: [OpenIndiana-discuss] Bash bug issue, Bob Friesenhahn...:

Unfortunately, 'dash' is not completely compatible with scripts written for 
'bash'.  It is not clear to my why people write shell scripts targeting bash, 
but it seems to happen often.


Two reasons:

- It's the "all the world's a VAX" syndrome for the current generation.

- bash (and ksh) do provide some handy features that traditional Bourne
  shell does not, and for a large portion of inexperienced programmers,
  convenience/laziness trumps portability

Both things drive me crazy, but they've been going on for my entire
career in computing, so I have no reason to expect that either are going
to ever disappear.

Tim
--
Tim Mooney tim.moo...@ndsu.edu
Enterprise Computing & Infrastructure  701-231-1076 (Voice)
Room 242-J6, Quentin Burdick Building  701-231-8541 (Fax)
North Dakota State University, Fargo, ND 58105-5164

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Predrag Zecevic [Unix Systems Administrator]

On 09/25/14 03:48 PM, Bob Friesenhahn wrote:

On Thu, 25 Sep 2014, Udo Grabowski (IMK) wrote:


Recent discussions seem to lead to a general security concern
with the crippled bash parser, so there nearly certainly will
be more and more security issues in the next days to come up.
I think the better alternative is to provide 'dash' and symlink
bash to dash instead, as dash much cleaner, faster, and POSIX -
compliant. Although, as it has not been widely used as bash
yet, could have its own bugs not yet discovered


Unfortunately, 'dash' is not completely compatible with scripts written for 
'bash'.  It is not clear to my why people write shell
scripts targeting bash, but it seems to happen often.

Bob


Probably because they are coming from Linux background...

I had to leave ksh because of that ...

Regards.

--
Predrag Zečević, Technical Support Analyst, 2e Systems GmbH

Telephone: +49 6196 9505 815, Facsimile: +49 6196 9505 894
Mobile:+49  174 3109 288, Skype: predrag.zecevic
E-mail:predrag.zece...@2e-systems.com

Headquarter:  2e Systems GmbH, Königsteiner Str. 87,
  65812 Bad Soden am Taunus, Germany
Company registration: Amtsgericht Königstein (Germany), HRB 7303
Managing director:Phil Douglas

http://www.2e-systems.com/ - Making your business fly!

[***]===---
Never put off till run-time what you can do at compile-time. -- D. Gries

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Bob Friesenhahn

On Thu, 25 Sep 2014, Udo Grabowski (IMK) wrote:


Recent discussions seem to lead to a general security concern
with the crippled bash parser, so there nearly certainly will
be more and more security issues in the next days to come up.
I think the better alternative is to provide 'dash' and symlink
bash to dash instead, as dash much cleaner, faster, and POSIX -
compliant. Although, as it has not been widely used as bash
yet, could have its own bugs not yet discovered


Unfortunately, 'dash' is not completely compatible with scripts 
written for 'bash'.  It is not clear to my why people write shell 
scripts targeting bash, but it seems to happen often.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Alexander Pyhalov

On 09/25/2014 15:31, Carl Brewer wrote:


I wonder, I've tried in the past to bump this box to 151a9 but had
problems with messy pkg errors that I didn't have the time to sort out -
how stable is hipster these days?  Stable enough to run a LAN server
with a couple of Virtualbox VM's on it?



Honestly, I don't know :)
Usually if something is broken, it's desktop-related soft (as it's 
harder to test thoroughly). I think that in the nearest future Sun DHCP 
server will be removed from illumos-gate (and our users will immediately 
see this).
I run several test VMs and  VMs which I use in my courses (VirtualBox, 
VMware and KVM guests, but no OI host). There was no anything completely 
catastrophic. However, sometimes some issues appear (don't know if /dev 
has them). I think, you can try. Note, that dev => hipster updates are 
not supported now. The best way to install is to use install CDs: 
http://dlc.openindiana.org/isos/hipster/.

--
Best regards,
Alexander Pyhalov,
system administrator of Southern Federal University IT department

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Brian Hechinger
Don't get too up in a rush to upgrade bash. It's just been verified that
the patch isn't actually effective. :(

-brian

On Thu, Sep 25, 2014 at 09:31:52PM +1000, Carl Brewer wrote:
> On 25/09/2014 9:28 PM, Alexander Pyhalov wrote:
> >On 09/25/2014 15:08, Carl Brewer wrote:
> >>On 25/09/2014 6:50 PM, Alexander Pyhalov wrote:
> >>>On 09/25/2014 12:46, Udo Grabowski (IMK) wrote:
> On 25/09/2014 10:42, Jonathan Adams wrote:
> >http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/
> >
> The bug "works", so we are affected with everything that
> is based on bash, as well as all users using bash in their
> projects.
> This is a bug with high impact and risks, so a fix should be
> available for oi dev and hipster as fast as possible.
> >>>
> >>>Hello.
> >>>I've seen fix for CVE-2014-6271, which I've already committed, but not
> >>>for CVE-2014-7169...
> >>>
> >>
> >>I'm stuck on 151a8 at the moment, is there any chance a fixed bash
> >>binary could be made available somewhere?
> >
> >Binary is here.
> >
> >http://buildzone.oi-build.r61.net/bash
> >
> >It runs on /dev for me, but I have /dev with freshly rebuilt
> >illumos-gate. You can try if it works for you.
> >Of course, I don't guarantee that it will not eat your data :)
> >
> 
> 
> It's not immediately happy :
> 
> $ ./bash --version
> ld.so.1: bash: fatal: libc.so.1: version 'ILLUMOS_0.8' not found (required
> by file bash)
> ld.so.1: bash: fatal: libc.so.1: open failed: No such file or directory
> Killed
> 
> 
>  ldd ./bash
> libcurses.so.1 =>/lib/libcurses.so.1
> libdl.so.1 =>/lib/libdl.so.1
> libc.so.1 => /lib/libc.so.1
> libc.so.1 (ILLUMOS_0.8) =>   (version not found)
> libsocket.so.1 =>/lib/libsocket.so.1
> libgen.so.1 =>   /lib/libgen.so.1
> libnsl.so.1 =>   /lib/libnsl.so.1
> libmp.so.2 =>/lib/libmp.so.2
> libmd.so.1 =>/lib/libmd.so.1
> libm.so.2 => /lib/libm.so.2
> 
> 
> I wonder, I've tried in the past to bump this box to 151a9 but had problems
> with messy pkg errors that I didn't have the time to sort out - how stable
> is hipster these days?  Stable enough to run a LAN server with a couple of
> Virtualbox VM's on it?
> 
> 
> 
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Carl Brewer

On 25/09/2014 9:28 PM, Alexander Pyhalov wrote:

On 09/25/2014 15:08, Carl Brewer wrote:

On 25/09/2014 6:50 PM, Alexander Pyhalov wrote:

On 09/25/2014 12:46, Udo Grabowski (IMK) wrote:

On 25/09/2014 10:42, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/


The bug "works", so we are affected with everything that
is based on bash, as well as all users using bash in their
projects.
This is a bug with high impact and risks, so a fix should be
available for oi dev and hipster as fast as possible.


Hello.
I've seen fix for CVE-2014-6271, which I've already committed, but not
for CVE-2014-7169...



I'm stuck on 151a8 at the moment, is there any chance a fixed bash
binary could be made available somewhere?


Binary is here.

http://buildzone.oi-build.r61.net/bash

It runs on /dev for me, but I have /dev with freshly rebuilt
illumos-gate. You can try if it works for you.
Of course, I don't guarantee that it will not eat your data :)




It's not immediately happy :

$ ./bash --version
ld.so.1: bash: fatal: libc.so.1: version 'ILLUMOS_0.8' not found 
(required by file bash)

ld.so.1: bash: fatal: libc.so.1: open failed: No such file or directory
Killed


 ldd ./bash
libcurses.so.1 =>/lib/libcurses.so.1
libdl.so.1 =>/lib/libdl.so.1
libc.so.1 => /lib/libc.so.1
libc.so.1 (ILLUMOS_0.8) =>   (version not found)
libsocket.so.1 =>/lib/libsocket.so.1
libgen.so.1 =>   /lib/libgen.so.1
libnsl.so.1 =>   /lib/libnsl.so.1
libmp.so.2 =>/lib/libmp.so.2
libmd.so.1 =>/lib/libmd.so.1
libm.so.2 => /lib/libm.so.2


I wonder, I've tried in the past to bump this box to 151a9 but had 
problems with messy pkg errors that I didn't have the time to sort out - 
how stable is hipster these days?  Stable enough to run a LAN server 
with a couple of Virtualbox VM's on it?




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Udo Grabowski (IMK)

On 25/09/2014 13:08, Carl Brewer wrote:

On 25/09/2014 6:50 PM, Alexander Pyhalov wrote:

On 09/25/2014 12:46, Udo Grabowski (IMK) wrote:

On 25/09/2014 10:42, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/


The bug "works", so we are affected with everything that
is based on bash, as well as all users using bash in their
projects.
This is a bug with high impact and risks, so a fix should be
available for oi dev and hipster as fast as possible.


Hello.
I've seen fix for CVE-2014-6271, which I've already committed, but not
for CVE-2014-7169...



I'm stuck on 151a8 at the moment, is there any chance a fixed bash
binary could be made available somewhere?



Recent discussions seem to lead to a general security concern
with the crippled bash parser, so there nearly certainly will
be more and more security issues in the next days to come up.
I think the better alternative is to provide 'dash' and symlink
bash to dash instead, as dash much cleaner, faster, and POSIX -
compliant. Although, as it has not been widely used as bash
yet, could have its own bugs not yet discovered
--
Dr.Udo Grabowski   Inst.f.Meteorology & Climate Research IMK-ASF-SAT
http://www.imk-asf.kit.edu/english/sat.php
KIT - Karlsruhe Institute of Technology   http://www.kit.edu
Postfach 3640,76021 Karlsruhe,Germany T:(+49)721 608-26026 F:-926026

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Alexander Pyhalov

On 09/25/2014 15:08, Carl Brewer wrote:

On 25/09/2014 6:50 PM, Alexander Pyhalov wrote:

On 09/25/2014 12:46, Udo Grabowski (IMK) wrote:

On 25/09/2014 10:42, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/


The bug "works", so we are affected with everything that
is based on bash, as well as all users using bash in their
projects.
This is a bug with high impact and risks, so a fix should be
available for oi dev and hipster as fast as possible.


Hello.
I've seen fix for CVE-2014-6271, which I've already committed, but not
for CVE-2014-7169...



I'm stuck on 151a8 at the moment, is there any chance a fixed bash
binary could be made available somewhere?


Binary will likely not work, because it was compiled with later libc 
version. But you can try compile it yourself (you can look at using 
oi-userland on /dev - https://github.com/OpenIndiana/oi-userland, it can 
work with some tweaks to configs).



--
С уважением,
Александр Пыхалов,
программист отдела телекоммуникационной инфраструктуры
управления информационно-коммуникационной инфраструктуры ЮФУ

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Carl Brewer

On 25/09/2014 6:50 PM, Alexander Pyhalov wrote:

On 09/25/2014 12:46, Udo Grabowski (IMK) wrote:

On 25/09/2014 10:42, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/


The bug "works", so we are affected with everything that
is based on bash, as well as all users using bash in their
projects.
This is a bug with high impact and risks, so a fix should be
available for oi dev and hipster as fast as possible.


Hello.
I've seen fix for CVE-2014-6271, which I've already committed, but not
for CVE-2014-7169...



I'm stuck on 151a8 at the moment, is there any chance a fixed bash 
binary could be made available somewhere?




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Alexander Pyhalov

On 09/25/2014 12:46, Udo Grabowski (IMK) wrote:

On 25/09/2014 10:42, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/


The bug "works", so we are affected with everything that
is based on bash, as well as all users using bash in their
projects.
This is a bug with high impact and risks, so a fix should be
available for oi dev and hipster as fast as possible.


Hello.
I've seen fix for CVE-2014-6271, which I've already committed, but not 
for CVE-2014-7169...


--
Best regards,
Alexander Pyhalov,
system administrator of Southern Federal University IT department

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Udo Grabowski (IMK)

On 25/09/2014 10:42, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/


The bug "works", so we are affected with everything that
is based on bash, as well as all users using bash in their
projects.
This is a bug with high impact and risks, so a fix should be
available for oi dev and hipster as fast as possible.
--
Dr.Udo Grabowski   Inst.f.Meteorology & Climate Research IMK-ASF-SAT
http://www.imk-asf.kit.edu/english/sat.php
KIT - Karlsruhe Institute of Technology   http://www.kit.edu
Postfach 3640,76021 Karlsruhe,Germany T:(+49)721 608-26026 F:-926026

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Predrag Zecevic [Unix Systems Administrator]

Hi,

I have already upgraded from /hipster-2014.1 which has fix in it:
http://github.com/OpenIndiana/oi-userland/commit/35d2023cdaeba3486586ffb59e4f8a1ecc7a2c24

So, it affects all I guess, until bash is updated.

Regards.

On 09/25/14 10:42 AM, Jonathan Adams wrote:

http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/

does anyone know if this affects us?
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss



--
Predrag Zečević, Technical Support Analyst, 2e Systems GmbH

Telephone: +49 6196 9505 815, Facsimile: +49 6196 9505 894
Mobile:+49  174 3109 288, Skype: predrag.zecevic
E-mail:predrag.zece...@2e-systems.com

Headquarter:  2e Systems GmbH, Königsteiner Str. 87,
  65812 Bad Soden am Taunus, Germany
Company registration: Amtsgericht Königstein (Germany), HRB 7303
Managing director:Phil Douglas

http://www.2e-systems.com/ - Making your business fly!

[***]===---
Your code should be more efficient!

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Krzysztof Grzempa
I guess you can test it yourself:

$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

2014-09-25 10:42 GMT+02:00 Jonathan Adams :

> http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/
>
> does anyone know if this affects us?
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


[OpenIndiana-discuss] Bash bug issue

2014-09-25 Thread Jonathan Adams
http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/

does anyone know if this affects us?
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss