[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Bug in Bash shell creates big security hole on anything with *nix in it



Hi Klaus,
Please find below a link to my modified init scipt:
cf: http : / / s94002264.onlinehome.us/grub/k740/init740.zip (use save as)
They key thing is to replace the cifs mount lines as below.
/static/mount.cifs "${NFSDIR}" /mnt-system -r -n -o guest,noserverino,nounix > /dev/null 2>&1 && MOUNTED="yes" mount -t cifs "${NFSDIR}" /mnt-system -r -n -o user=guest,noserverino,nounix > /dev/null 2>&1 && MOUNTED="yes" You may also consider adding some of the extra binaries necessary for the pxe/cifs boot as an alternate minirt on the dvd. cf: http : / / s94002264.onlinehome.us/grub/k741/minirt_741.gz (use save as) minirt_741.tgz is also available to check the content. Regarding the e1000e network interface, the e1000 (without the ending "e") works fine. Only the e1000e have a problem. This is really weird and I have no clue what is the root cause of this problem with that specific e1000e einterface. Easy to chek it out with vmware using one of the following parameters in the vmx file:
ethernet0.virtualDev = "vmxnet3" ==> ok
ethernet0.virtualDev = "e1000"    ==> ok
ethernet0.virtualDev = "e1000e"  ==> fail
Best Regards,
Gilles

PS: Could you please ackowledge good reception of this email as it seems that sometimes my email get rejected.

At 06:55 PM 9/24/2014, Klaus Knopper wrote:
Hello Gilles,

On Wed, Sep 24, 2014 at 06:42:52PM -0700, Gilles van Ruymbeke wrote:
> Hi Klaus,
> You may also want to update the GNU Bourne Again Shell (Bash) to fix
> a new vulnerability, cf the link below:
> http : / / arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/

Since this is a local, not remote security problem, I don't worry much
about it (you can get root more easily by just typing "sudo"), but the
security issues with apts signature verification are of more concern. If
making a new release, I would like to fix as many bugs as possible, of
course. Do you have new information about the e1000e issue?

Regards
-Klaus


--
To UNSUBSCRIBE, email to debian-knoppix-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: [🔎] 20140925015523.GF714@knopper.net">https://lists.debian.org/[🔎] 20140925015523.GF714@knopper.net


Reply to: