http://regeneracion.mx/red-libre/software-libre-como-unica-via-para-proteger-la-privacidad-julian-assange/

2014-09-29 20:32 GMT-03:00 Max Miorim <[email protected]>:

> Saiu para outras já. No Debian, por exemplo, o pacote atualizado foi
> disponibilizado já no dia 25/09.
>
> O que eu acho que ainda não tem patches "oficiais" é a essa segfault
> (CVE-2014-7186) e a CVE-2014-7187.
>
> On Mon, Sep 29, 2014 at 7:56 PM, Sérgio Abrantes Junior <
> [email protected]> wrote:
>
>> Parece que essa atualização saiu só pro slack.
>>
>> 2014-09-29 18:51 GMT-03:00 J. Tozo <[email protected]>:
>>
>> Instalei a ultima versão com o patch salvador do Florian Weimer e:
>>>
>>> root@host:/tmp# bash --version
>>> GNU bash, version 4.2.50(2)-release (x86_64-slackware-linux-gnu)
>>> Copyright (C) 2011 Free Software Foundation, Inc.
>>> License GPLv3+: GNU GPL version 3 or later <
>>> http://gnu.org/licenses/gpl.html>
>>>
>>> This is free software; you are free to change and redistribute it.
>>> There is NO WARRANTY, to the extent permitted by law.
>>> root@host:/tmp# ./bashcheck
>>> Not vulnerable to CVE-2014-6271 (original shellshock)
>>> Not vulnerable to CVE-2014-7169 (taviso bug)
>>> ./bashcheck: line 18: 15852 Segmentation fault      bash -c "true
>>> $(printf '<<EOF %.0s' {1..79})" 2> /dev/null
>>> Vulnerable to CVE-2014-7186 (redir_stack bug)
>>> Test for CVE-2014-7187 not reliable without address sanitizer
>>> Variable function parser inactive, likely safe from unknown parser bug
>>>
>>> Me preocupa especificamente esse Segfault ai
>>>
>>> Sep 29 18:42:04 host kernel: [5969481.075841] bash[15818]: segfault at
>>> 4c5c450 ip 00000000004245c3 sp 00007fff49154740 error 4 in
>>> bash[400000+e4000]
>>>
>>> Ja vi que o lcamtuf chegou em:
>>> bash[3054]: segfault at 41414141 ip 00190d96 ...
>>>
>>> Chora.
>>>
>>>
>>> On Mon, Sep 29, 2014 at 6:34 PM, Max Miorim <[email protected]> wrote:
>>>
>>>> Ah, isto aqui também é util: https://github.com/hannob/bashcheck
>>>>
>>>> É um shell script que diz quais das vulnerabilidades afetam a versão
>>>> que tem instalado.
>>>>
>>>> On Mon, Sep 29, 2014 at 6:32 PM, Max Miorim <[email protected]>
>>>> wrote:
>>>>
>>>>> Alguém ai já tentou usar o Slackware sem o bash ou pelo menos sem o
>>>>> bash como /bin/sh?
>>>>>
>>>>> Eu sei que o Debian e os BSDs usam outros shells como /bin/sh (dash,
>>>>> ash, ksh, pd-ksh e etc.) e lembro que quando eu tentei fazer isso, tive
>>>>> problemas com a inicialização no Slackware (as arrays são coisas
>>>>> específicas do bash, não é POSIX sh e algumas coisas como a configuração 
>>>>> de
>>>>> rede dependem disso).
>>>>>
>>>>> On Mon, Sep 29, 2014 at 6:27 PM, J. Tozo <[email protected]> wrote:
>>>>>
>>>>>> Voltem das colinas!
>>>>>>
>>>>>> Mas não por muito tempo
>>>>>>
>>>>>> https://twitter.com/lcamtuf/status/516297412579581952
>>>>>>
>>>>>> [image: tumblr_mml9mp9wCx1s9x8i6o1_400.gif (280×300)]
>>>>>>
>>>>>>
>>>>>>
>>>>>> ---------- Forwarded message ----------
>>>>>> From: Slackware Security Team <[email protected]>
>>>>>> Date: Mon, Sep 29, 2014 at 4:33 PM
>>>>>> Subject: [slackware-security] bash (SSA:2014-272-01)
>>>>>> To: [email protected]
>>>>>>
>>>>>>
>>>>>>
>>>>>> -----BEGIN PGP SIGNED MESSAGE-----
>>>>>> Hash: SHA1
>>>>>>
>>>>>> [slackware-security]  bash (SSA:2014-272-01)
>>>>>>
>>>>>> New bash packages are available for Slackware 13.0, 13.1, 13.37,
>>>>>> 14.0, 14.1,
>>>>>> and -current to fix a security issue.
>>>>>>
>>>>>>
>>>>>> Here are the details from the Slackware 14.1 ChangeLog:
>>>>>> +--------------------------+
>>>>>> patches/packages/bash-4.2.050-i486-1_slack14.1.txz:  Upgraded.
>>>>>>   Another bash update.  Here's some information included with the
>>>>>> patch:
>>>>>>     "This patch changes the encoding bash uses for exported functions
>>>>>> to avoid
>>>>>>     clashes with shell variables and to avoid depending only on an
>>>>>> environment
>>>>>>     variable's contents to determine whether or not to interpret it
>>>>>> as a shell
>>>>>>     function."
>>>>>>   After this update, an environment variable will not go through the
>>>>>> parser
>>>>>>   unless it follows this naming structure:  BASH_FUNC_*%%
>>>>>>   Most scripts never expected to import functions from environment
>>>>>> variables,
>>>>>>   so this change (although not backwards compatible) is not likely to
>>>>>> break
>>>>>>   many existing scripts.  It will, however, close off access to the
>>>>>> parser as
>>>>>>   an attack surface in the vast majority of cases.  There's already
>>>>>> another
>>>>>>   vulnerability similar to CVE-2014-6271 for which there is not yet a
>>>>>> fix,
>>>>>>   but this hardening patch prevents it (and likely many more similar
>>>>>> ones).
>>>>>>   Thanks to Florian Weimer and Chet Ramey.
>>>>>>   (* Security fix *)
>>>>>> +--------------------------+
>>>>>>
>>>>>>
>>>>>> Where to find the new packages:
>>>>>> +-----------------------------+
>>>>>>
>>>>>> Thanks to the friendly folks at the OSU Open Source Lab
>>>>>> (http://osuosl.org) for donating FTP and rsync hosting
>>>>>> to the Slackware project!  :-)
>>>>>>
>>>>>> Also see the "Get Slack" section on http://slackware.com for
>>>>>> additional mirror sites near you.
>>>>>>
>>>>>> Updated package for Slackware 13.0:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bash-3.1.020-i486-1_slack13.0.txz
>>>>>>
>>>>>> Updated package for Slackware x86_64 13.0:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bash-3.1.020-x86_64-1_slack13.0.txz
>>>>>>
>>>>>> Updated package for Slackware 13.1:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bash-4.1.014-i486-1_slack13.1.txz
>>>>>>
>>>>>> Updated package for Slackware x86_64 13.1:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bash-4.1.014-x86_64-1_slack13.1.txz
>>>>>>
>>>>>> Updated package for Slackware 13.37:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bash-4.1.014-i486-1_slack13.37.txz
>>>>>>
>>>>>> Updated package for Slackware x86_64 13.37:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bash-4.1.014-x86_64-1_slack13.37.txz
>>>>>>
>>>>>> Updated package for Slackware 14.0:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bash-4.2.050-i486-1_slack14.0.txz
>>>>>>
>>>>>> Updated package for Slackware x86_64 14.0:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bash-4.2.050-x86_64-1_slack14.0.txz
>>>>>>
>>>>>> Updated package for Slackware 14.1:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bash-4.2.050-i486-1_slack14.1.txz
>>>>>>
>>>>>> Updated package for Slackware x86_64 14.1:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bash-4.2.050-x86_64-1_slack14.1.txz
>>>>>>
>>>>>> Updated package for Slackware -current:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/bash-4.3.027-i486-1.txz
>>>>>>
>>>>>> Updated package for Slackware x86_64 -current:
>>>>>>
>>>>>> ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/bash-4.3.027-x86_64-1.txz
>>>>>>
>>>>>>
>>>>>> MD5 signatures:
>>>>>> +-------------+
>>>>>>
>>>>>> Slackware 13.0 package:
>>>>>> 8b5f50012f3c7b18474d7cf19f2be2bb  bash-3.1.020-i486-1_slack13.0.txz
>>>>>>
>>>>>> Slackware x86_64 13.0 package:
>>>>>> 3cbe8607bf2209e694320f6416f1cd04  bash-3.1.020-x86_64-1_slack13.0.txz
>>>>>>
>>>>>> Slackware 13.1 package:
>>>>>> c674f9b681c144c32aba0923303d789b  bash-4.1.014-i486-1_slack13.1.txz
>>>>>>
>>>>>> Slackware x86_64 13.1 package:
>>>>>> 223fc7505cd2dedd99b79d7f510e749c  bash-4.1.014-x86_64-1_slack13.1.txz
>>>>>>
>>>>>> Slackware 13.37 package:
>>>>>> 4b4e4df9e4e949637a641a94aab35765  bash-4.1.014-i486-1_slack13.37.txz
>>>>>>
>>>>>> Slackware x86_64 13.37 package:
>>>>>> 35f35367efd279d2001de989f366b972  bash-4.1.014-x86_64-1_slack13.37.txz
>>>>>>
>>>>>> Slackware 14.0 package:
>>>>>> 19cb9e04683c9020417490047f20b40d  bash-4.2.050-i486-1_slack14.0.txz
>>>>>>
>>>>>> Slackware x86_64 14.0 package:
>>>>>> 10bc930d1dd85cf3446f454b129e2bc7  bash-4.2.050-x86_64-1_slack14.0.txz
>>>>>>
>>>>>> Slackware 14.1 package:
>>>>>> 1d1f8137b674813bf7f070b66ad713b1  bash-4.2.050-i486-1_slack14.1.txz
>>>>>>
>>>>>> Slackware x86_64 14.1 package:
>>>>>> e80cc985c6112aea20d0ba0eb2821d03  bash-4.2.050-x86_64-1_slack14.1.txz
>>>>>>
>>>>>> Slackware -current package:
>>>>>> 175685f32cfa87da1c9d7cdfb42786c5  a/bash-4.3.027-i486-1.txz
>>>>>>
>>>>>> Slackware x86_64 -current package:
>>>>>> 34a83642b058fa40e6f441c6161e2208  a/bash-4.3.027-x86_64-1.txz
>>>>>>
>>>>>>
>>>>>> Installation instructions:
>>>>>> +------------------------+
>>>>>>
>>>>>> Upgrade the package as root:
>>>>>> # upgradepkg bash-4.2.050-i486-1_slack14.1.txz
>>>>>>
>>>>>>
>>>>>> +-----+
>>>>>>
>>>>>> Slackware Linux Security Team
>>>>>> http://slackware.com/gpg-key
>>>>>> [email protected]
>>>>>>
>>>>>>
>>>>>> +------------------------------------------------------------------------+
>>>>>> | To leave the slackware-security mailing list:
>>>>>>     |
>>>>>>
>>>>>> +------------------------------------------------------------------------+
>>>>>> | Send an email to [email protected] with this text in the
>>>>>> body of |
>>>>>> | the email message:
>>>>>>    |
>>>>>> |
>>>>>>     |
>>>>>> |   unsubscribe slackware-security
>>>>>>    |
>>>>>> |
>>>>>>     |
>>>>>> | You will get a confirmation message back containing instructions
>>>>>> to    |
>>>>>> | complete the process.  Please do not reply to this email address.
>>>>>>     |
>>>>>>
>>>>>> +------------------------------------------------------------------------+
>>>>>> -----BEGIN PGP SIGNATURE-----
>>>>>> Version: GnuPG v1
>>>>>>
>>>>>> iEYEARECAAYFAlQpqCoACgkQakRjwEAQIjPD0QCfSmNXkeHavRJjRtENMC13Rtx6
>>>>>> DsYAn1fsM+SOgqVuB7URSJtSKrmtPvr8
>>>>>> =Xi8W
>>>>>> -----END PGP SIGNATURE-----
>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>> Grato,
>>>>>>
>>>>>>  Tozo
>>>>>>
>>>>>>  --
>>>>>> GUS-BR - Grupo de Usuários de Slackware Brasil
>>>>>> http://www.slackwarebrasil.org/
>>>>>> http://groups.google.com/group/slack-users-br
>>>>>>
>>>>>> Antes de perguntar:
>>>>>>
>>>>>> http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao
>>>>>>
>>>>>> Para sair da lista envie um e-mail para:
>>>>>> [email protected]
>>>>>> ---
>>>>>> Você recebeu essa mensagem porque está inscrito no grupo "Slackware
>>>>>> Users Group - Brazil" dos Grupos do Google.
>>>>>> Para cancelar inscrição nesse grupo e parar de receber e-mails dele,
>>>>>> envie um e-mail para [email protected].
>>>>>> Para mais opções, acesse https://groups.google.com/d/optout.
>>>>>>
>>>>>
>>>>>
>>>>  --
>>>> GUS-BR - Grupo de Usuários de Slackware Brasil
>>>> http://www.slackwarebrasil.org/
>>>> http://groups.google.com/group/slack-users-br
>>>>
>>>> Antes de perguntar:
>>>>
>>>> http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao
>>>>
>>>> Para sair da lista envie um e-mail para:
>>>> [email protected]
>>>> ---
>>>> Você recebeu essa mensagem porque está inscrito no grupo "Slackware
>>>> Users Group - Brazil" dos Grupos do Google.
>>>> Para cancelar inscrição nesse grupo e parar de receber e-mails dele,
>>>> envie um e-mail para [email protected].
>>>> Para mais opções, acesse https://groups.google.com/d/optout.
>>>>
>>>
>>>
>>>
>>> --
>>> Grato,
>>>
>>>  Tozo
>>>
>>>  --
>>> GUS-BR - Grupo de Usuários de Slackware Brasil
>>> http://www.slackwarebrasil.org/
>>> http://groups.google.com/group/slack-users-br
>>>
>>> Antes de perguntar:
>>>
>>> http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao
>>>
>>> Para sair da lista envie um e-mail para:
>>> [email protected]
>>> ---
>>> Você recebeu essa mensagem porque está inscrito no grupo "Slackware
>>> Users Group - Brazil" dos Grupos do Google.
>>> Para cancelar inscrição nesse grupo e parar de receber e-mails dele,
>>> envie um e-mail para [email protected].
>>> Para mais opções, acesse https://groups.google.com/d/optout.
>>>
>>
>>  --
>> GUS-BR - Grupo de Usuários de Slackware Brasil
>> http://www.slackwarebrasil.org/
>> http://groups.google.com/group/slack-users-br
>>
>> Antes de perguntar:
>>
>> http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao
>>
>> Para sair da lista envie um e-mail para:
>> [email protected]
>> ---
>> Você recebeu essa mensagem porque está inscrito no grupo "Slackware Users
>> Group - Brazil" dos Grupos do Google.
>> Para cancelar inscrição nesse grupo e parar de receber e-mails dele,
>> envie um e-mail para [email protected].
>> Para mais opções, acesse https://groups.google.com/d/optout.
>>
>
>  --
> GUS-BR - Grupo de Usuários de Slackware Brasil
> http://www.slackwarebrasil.org/
> http://groups.google.com/group/slack-users-br
>
> Antes de perguntar:
>
> http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao
>
> Para sair da lista envie um e-mail para:
> [email protected]
> ---
> Você recebeu essa mensagem porque está inscrito no grupo "Slackware Users
> Group - Brazil" dos Grupos do Google.
> Para cancelar inscrição nesse grupo e parar de receber e-mails dele, envie
> um e-mail para [email protected].
> Para mais opções, acesse https://groups.google.com/d/optout.
>

-- 
GUS-BR - Grupo de Usuários de Slackware Brasil
http://www.slackwarebrasil.org/
http://groups.google.com/group/slack-users-br

Antes de perguntar:
http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao

Para sair da lista envie um e-mail para:
[email protected]
--- 
Você está recebendo esta mensagem porque se inscreveu no grupo "Slackware Users 
Group - Brazil" dos Grupos do Google.
Para cancelar inscrição nesse grupo e parar de receber e-mails dele, envie um 
e-mail para [email protected].
Para obter mais opções, acesse https://groups.google.com/d/optout.

Responder a