[arch-general] A good time to switch to dash as /bin/sh?

Doug Newgard scimmia at archlinux.info
Fri Sep 26 14:34:08 UTC 2014


On 2014-09-26 09:29, Maarten de Vries wrote:
> On 26 September 2014 16:25, Doug Newgard <scimmia at archlinux.info> 
> wrote:
> 
>> On 2014-09-26 09:15, lolilolicon wrote:
>> 
>>> On Fri, Sep 26, 2014 at 9:50 PM, Doug Newgard 
>>> <scimmia at archlinux.info>
>>> wrote:
>>> 
>>>> The problem is on many systems /bin/sh is linked to bash -- which is 
>>>> why
>>>>> this bug is so widespread / severe. /bin/sh is "the single biggest
>>>>> UNIX loophole", so let's make it a bit smaller by switching it to
>>>>> something minimal, such as dash.
>>>>> 
>>>> 
>>>> 
>>>> Why? Why is that the problem? What attack vector is available 
>>>> because of
>>>> this? Give me specifics, not theoretical, non-existent examples.
>>>> 
>>> 
>>> Because the vulnerable systems do not call bash by name, they call
>>> /bin/sh. And they are vulnerable only because /bin/sh is linked to 
>>> bash.
>>> 
>> 
>> Wrong, they DO call bash by name. The main issues are with ssh, which 
>> uses
>> the user's specified interactive shell, and with Apache's mod_cgi and
>> mod_cgid, which do call bash. Again, stop providing non-existent FUD 
>> and
>> give real-world examples of where having /bin/sh linked to something 
>> else
>> would have mitigated this.
> 
> 
> 
> Some programs may call bash by name, but many will just use system() 
> and
> get bash without asking for it.
> 
> From man 3 system:
> 
> The system() library function uses fork(2) to create a child process 
> that
>> executes the shell command specified in command using execl(3) as
>> follows:           execl("/bin/sh", "sh", "-c", command, (char *) 0);
>> 

Instead of theorizing that "many" will do this, give a real world 
example of where this happens and would have reduced the attack surface 
of the bug in question.
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: pubkey.asc
URL: <http://mailman.archlinux.org/pipermail/arch-general/attachments/20140926/66c2c591/attachment.ksh>


More information about the arch-general mailing list