Active Topics

 


Reply
Thread Tools
Bundyo's Avatar
Posts: 4,708 | Thanked: 4,649 times | Joined on Oct 2007 @ Bulgaria
#11
Originally Posted by javispedro View Post
So how exactly do you plan to exploit this vulnerability on Jolla?

What I would like to see is an upgrade to GPLv3 Bash4, instead of wasting more time on their bash3 fork.
Probably like this, check the Internet Scans section:
http://www.volexity.com/blog/?p=19
__________________
Technically, there are three determinate states the cat could be in: Alive, Dead, and Bloody Furious.
 
javispedro's Avatar
Posts: 2,355 | Thanked: 5,249 times | Joined on Jan 2009 @ Barcelona
#12
Originally Posted by Bundyo View Post
Probably like this, check the Internet Scans section:
http://www.volexity.com/blog/?p=19
But do you run a webserver on your Jolla? That can run CGI scripts?
 
Bundyo's Avatar
Posts: 4,708 | Thanked: 4,649 times | Joined on Oct 2007 @ Bulgaria
#13
Not yet
__________________
Technically, there are three determinate states the cat could be in: Alive, Dead, and Bloody Furious.
 
Guest | Posts: n/a | Thanked: 0 times | Joined on
#14
Originally Posted by javispedro View Post
But do you run a webserver on your Jolla? That can run CGI scripts?
Ehh, yes
 

The Following User Says Thank You to For This Useful Post:
coderus's Avatar
Posts: 6,436 | Thanked: 12,699 times | Joined on Nov 2011 @ Ängelholm, Sweden
#15
@javispedro #paranoiaeverywhere, lol
__________________
Telegram | Openrepos | GitHub | Revolut donations
 
Posts: 136 | Thanked: 68 times | Joined on Nov 2013 @ Streets of Avalon | Zwolle, the Netherlands
#16
Wrong subforum, but what about Maemo and Meego? These OS'es are infected too with this bug isn't it?
 

The Following User Says Thank You to vincr For This Useful Post:
Guest | Posts: n/a | Thanked: 0 times | Joined on
#17
Originally Posted by coderus View Post
anyway, waiting for bash update in nieldk repo
Wont have to wait long

Edit: https://openrepos.net/content/nieldk/bash

patchlevel 25, which fixes #shellschock

source (and binaries)
https://build.merproject.org/package...elnielsen/bash
Attached Images
 

Last edited by nieldk; 2014-09-25 at 15:38. Reason: Added screenshot
 

The Following 10 Users Say Thank You to For This Useful Post:
Posts: 1,548 | Thanked: 7,510 times | Joined on Apr 2010 @ Czech Republic
#18
Originally Posted by javispedro View Post
The JollaStore RPM packages are somewhat safer, but only because they are manually/statically analyzed.
Yeah, but as people are expected to publish compiled binaries, any QAed application can still every April 1 grab all your pictures and post them to Imgur. And the store QA has no realistic chance to find about this beforehand.

Still better than running as root, but there is still a lot of sensitive content accessible to unpriviledged accounts & full network access for all apps.
__________________
modRana: a flexible GPS navigation system
Mieru: a flexible manga and comic book reader
Universal Components - a solution for native looking yet component set independent QML appliactions (QtQuick Controls 2 & Silica supported as backends)
 

The Following User Says Thank You to MartinK For This Useful Post:
Posts: 170 | Thanked: 386 times | Joined on Dec 2009
#19
Originally Posted by vincr View Post
Wrong subforum, but what about Maemo and Meego? These OS'es are infected too with this bug isn't it?
When I ran the test command on my N9 it showed it was affected. I don't run a web server on it but I would be interested if there is any way to patch the N9 and N900 (haven't tested) once the mainstream patches get sorted.
 
pichlo's Avatar
Posts: 6,445 | Thanked: 20,981 times | Joined on Sep 2012 @ UK
#20
Just tested on my N900 (Bash4).
Code:
~ $ env x='() { :;}; echo vulnerable'  
bash -c "echo this is a test"
vulnerable
this is a test
~ $
Originally Posted by MartinK View Post
Still better than running as root


(Source: http://xkcd.com/1200/)

Last edited by pichlo; 2014-09-25 at 20:23. Reason: Added xkcd link
 

The Following 2 Users Say Thank You to pichlo For This Useful Post:
Reply

Tags
bash bug


 
Forum Jump


All times are GMT. The time now is 05:05.