When will bash for Raspbian be patched for CVE-2014-6271?
Debian has already patched for this vulnerability.
See https://lists.debian.org/debian-securit ... 00220.html for more details.
Code: Select all
sudo apt-get update
sudo apt-get upgrade
Incidentally, I blame the parents in any situation where this bug is exploitable.
Code: Select all
[email protected] ~ $ env ANYTHING='() { anything; }; /usr/bin/id -a' bash anything
uid=1000(pi) gid=1000(pi) groups=1000(pi),4(adm),20(dialout),24(cdrom),27(sudo),29(audio),44(video),46(plugdev),60(games),100(users),105(netdev),999(input)
Segmentation fault
You can check if you're vulnerable by running the following lines in your default shell, which on many systems will be Bash. If you see the words "busted", then you're at risk. If not, then either your Bash is fixed or your shell is using another interpreter.
Code: Select all
env X="() { :;} ; echo busted" /bin/sh -c "echo completed" env X="() { :;} ; echo busted" `which bash` -c "echo completed"
Thanks, I had tired:jojopi wrote:The new package (bash_4.2+dfsg-0.1+deb7u1_armhf.deb) was available before you posted, I believe. Have you tried:Incidentally, I blame the parents in any situation where this bug is exploitable. The whole purpose of bash is to execute arbitrary commands, and it already does so based on environment variables such as ENV. If you must try to use bash as a sandbox, sanitise the entire environment, not just the bits you know about.Code: Select all
sudo apt-get update sudo apt-get upgrade
Code: Select all
sudo apt-get update
sudo apt-get install --only-upgrade bash