From owner-freebsd-security@FreeBSD.ORG Fri Sep 26 17:41:42 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4FC627EF for ; Fri, 26 Sep 2014 17:41:42 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2B501C26 for ; Fri, 26 Sep 2014 17:41:42 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.9/8.14.9) with ESMTP id s8QHfgDt016858 for ; Fri, 26 Sep 2014 17:41:42 GMT (envelope-from bdrewery@freefall.freebsd.org) Received: (from bdrewery@localhost) by freefall.freebsd.org (8.14.9/8.14.9/Submit) id s8QHff0R016856 for freebsd-security@freebsd.org; Fri, 26 Sep 2014 17:41:41 GMT (envelope-from bdrewery) Received: (qmail 36831 invoked from network); 26 Sep 2014 12:41:39 -0500 Received: from unknown (HELO ?10.10.0.24?) (freebsd@shatow.net@10.10.0.24) by sweb.xzibition.com with ESMTPA; 26 Sep 2014 12:41:39 -0500 Message-ID: <5425A548.9090306@FreeBSD.org> Date: Fri, 26 Sep 2014 12:41:28 -0500 From: Bryan Drewery Organization: FreeBSD User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.1.2 MIME-Version: 1.0 Subject: Re: bash velnerability References: <00000148ab969845-5940abcc-bb88-4111-8f7f-8671b0d0300b-000000@us-west-2.amazonses.com> <54243F0F.6070904@FreeBSD.org> <54244982.8010002@FreeBSD.org> <16EB2C50-FBBA-4797-83B0-FB340A737238@circl.lu> <542596E3.3070707@FreeBSD.org> <5425999A.3070405@FreeBSD.org> In-Reply-To: <5425999A.3070405@FreeBSD.org> OpenPGP: id=6E4697CF; url=http://www.shatow.net/bryan/bryan2.asc Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="CDJL3S89Ak83sR08nPO1nPlqNfk9dmHSv" X-Mailman-Approved-At: Fri, 26 Sep 2014 20:56:26 +0000 Cc: freebsd-security , freebsd-ports X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Sep 2014 17:41:42 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --CDJL3S89Ak83sR08nPO1nPlqNfk9dmHSv Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On 9/26/2014 11:51 AM, Bryan Drewery wrote: > On 9/26/2014 11:46 AM, Bartek Rutkowski wrote: >> On Fri, Sep 26, 2014 at 6:40 PM, Bryan Drewery = wrote: >>> On 9/26/2014 2:36 AM, Steve Clement wrote: >>>> Dear all, >>>> >>>> In case you urgently need to go the manual route, here is one way to= really patch your systems: >>>> >>>> https://www.circl.lu/pub/tr-27/ >>>> >>>> Until the patch is in the bash upstream=E2=80=A6 (which it might be = by now) >>>> >>>> Take care, >>>> >>> >>> The port has had the fixes since yesterday. The packages are building= =2E >>> >>> -- >>> Regards, >>> Bryan Drewery >>> >> >> Apparently, the full fix is still not delivered, accordingly to this: >> http://seclists.org/oss-sec/2014/q3/741 >> >> Kind regards, >> Bartek Rutkowski >> >=20 > I'm pretty sure they call that a "feature". This is a bit different. > This is modifying the command used to call a function as the feature > intends. The vulnerability was that just parsing the environment would > execute the code. >=20 > TL;DR; You should cleanse your environment and only accept valid input > to work around this feature. The bash developer (Chet) said he would no= t > remove it by default, at least a few days ago. >=20 There is more discussion here http://seclists.org/oss-sec/2014/q3/746 Anyway I still think this is not anything to panic about. However I am making the decision to disable this feature entirely in our bash port by default. I will use christos@NetBSD's patch to add a --import-functions flag to bash. The port will allow selecting the default at build time. Ours will have it disabled. I have no idea what the impact is on this but it is the safest route for now; scripts passing functions in environment is crazy. --=20 Regards, Bryan Drewery --CDJL3S89Ak83sR08nPO1nPlqNfk9dmHSv Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iQEcBAEBAgAGBQJUJaVJAAoJEDXXcbtuRpfPlYMIAMaWhTvu6haxeP5FKQu4CR4U lWlUw4qzJQpS+/y9YM9FHymSmo0FxhoiHSzJlxOXSnjasAn3G+lhet35fBtykh2r YfL0ivFepjxpYyMiK0SD5RN+Nbf39SKaHTatO9oXZNuJjBTvUYR6Kgt/ztO3c1YJ pWwx5UNUGykjD5nFQomeONRDFtRf/NHY0xss1g66XFVyx3feI9c5oHSM0Z1Z+uti 0dr2I8e0ghVqEcIr7SfnhqyIGUEAFuavzIUk0G2TvxIlJiKZqsS2BkjcCKcNhuBf fu5mrrlFMupsK7ag50W2xIprlDWZ+B0hGDMfnUPdduHlTTtw1RI09gzisqkQxiY= =AjWi -----END PGP SIGNATURE----- --CDJL3S89Ak83sR08nPO1nPlqNfk9dmHSv--