Re: [Tails-dev] Bash bug

2014-09-24 Thread Jacob Appelbaum
On 9/24/14, anonym  wrote:
> 25/09/14 01:02, Jurre van Bergen wrote:
>>
>> Dear Tails users,
>>
>> As you might have heard there is a Bash vulnerability, I have created a
>> temporary countermeasure write-up below.
>
> Out of curiosity, have you (or any one else for that matter) come up
> with a relevant exploit in Tails? I suppose I'm talking mostly about
> actively supported (client-oriented) use cases -- it's obvious that any
> one running a custom setup with a hidden service sshd with AcceptEnv,
> for instance, is affected.
>
> By the way, this will be fixed in the Tails 1.1.2 emergency release [1],
> scheduled to be released later today (Thursday, CEST).
>
> Cheers!
>
> [1] The reason for the 1.1.2 release is not the bash bug, but the
> Firefox bug:
> https://www.mozilla.org/security/announce/2014/mfsa2014-73.html

By my count we'd want to ship an update to Firefox (libnss), bash
(dhclient? what else?) and apt (the http parser buffer overflow). Any
other critical bugs that were disclosed in the last few hours? :)

All the best,
Jacob
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Bash bug

2014-09-24 Thread Jurre van Bergen
Seems the Debian patch wasn't good enough, Tavis Ormandy wrote a bypass.
(https://twitter.com/taviso/status/514887394294652929)

Act with caution!

Jurre

On 09/25/2014 01:02 AM, Jurre van Bergen wrote:
>
> Dear Tails users,
>
> As you might have heard there is a Bash vulnerability, I have created a
> temporary countermeasure write-up below.
>
> Temporary countermeasure
> 
>
> Debian has provided an updated version, we recommend you to upgrade to
> the latest version of Bash and this is how you do it:
>
> This is a less safe way to do it, make sure you use a trusted network
> and please note this change isn't persistent.
>
> 1: Set up an administrative password[1] when you boot Tails
> 2: Connect to the Internet (I recommend using a trusted network)
> 3: Run the following in a "root terminal": apt-get update && apt-get
> install bash
>
> The more experienced user way:
>
> 1: Set up an administrative password[1] when you boot Tails
> 2 Download the wheezy package through a separate computer and place it
> on the persistent volume to install before you connect to the Internet
> and verify checksums :)
> 3 If you have the `deb` run in a "root terminal": dpkg -i /path/bash.deb
> 4: Connect to the internet
>
> [1]
> https://tails.boum.org/doc/first_steps/startup_options/administration_password/index.en.html
>
>
> ___
> Tails-dev mailing list
> Tails-dev@boum.org
> https://mailman.boum.org/listinfo/tails-dev
> To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.


___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Bash bug

2014-09-24 Thread anonym
25/09/14 01:02, Jurre van Bergen wrote:
> 
> Dear Tails users,
> 
> As you might have heard there is a Bash vulnerability, I have created a
> temporary countermeasure write-up below.

Out of curiosity, have you (or any one else for that matter) come up
with a relevant exploit in Tails? I suppose I'm talking mostly about
actively supported (client-oriented) use cases -- it's obvious that any
one running a custom setup with a hidden service sshd with AcceptEnv,
for instance, is affected.

By the way, this will be fixed in the Tails 1.1.2 emergency release [1],
scheduled to be released later today (Thursday, CEST).

Cheers!

[1] The reason for the 1.1.2 release is not the bash bug, but the
Firefox bug: https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.