Klaus Knopper answers your Linux questions
Ask Klaus
Answers to your Linux questions.
Shellshock
What about the Shellshock bug? Do I need to update Bash immediately? How can I know if my computer is vulnerable to a remote attack?
Because most distros have an easy-to-use packaging and update system, you should definitely update bash
. The commands in Debian-based distros would be
sudo apt-get update sudo apt-get install bash
which will pull the bug-fixed bash
package from the official repository and install it.
The more exciting question is: What can happen if you don't upgrade Bash? Recent news reported a lot of hype about the Bash bug and even made comparisons in severity with the Heartbleed SSL bug (which is totally different, of course). Most articles made it look like everyone with a Bash shell installed should immediately disconnect from the Internet. Which is not true, of course.
The ShellShock bug [1] is simply a programming error in the widely used Bash system shell when parsing shell variables. Storing a shell function in a variable can lead to execution of code if the function definition ends with a semicolon followed by additional commands. Alone, this unexpected behavior is not a remotely exploitable bug, because it affects shells running locally on your computer (i.e., if you feed the shell such a variable definition, the extraneous commands would be executed with permissions of the user calling the shell). You could as well have typed the command by yourself. It does not matter whether or not the computer is connected to the Internet.
Remote attack possibilities of Shellshock arise if two conditions are met:
- 1. Your computer is running a remote accessible service, like the Apache web server, that additionally has been configured to provide remote execution of a Bash shell – for example, through the CGI interface.
- 2. The shell, which has become remotely accessible by this, can be fed unfiltered variable definitions from a remote client.
Apart from a web server with CGI turned on (which is not the default setting), the DHCP client, which also acts a server taking care of your computer's connectivity, could be subject to an attack if it tries to store manipulated information in Bash shell variables. However, for a successful attack, the DHCP server, which provides addresses and network setup parameters (i.e., your home router, WLAN access point, dialup modem, or another computer in your network that can act as a DHCP server) needs to be compromised first to deliver manipulated data.
In other words, if your home network is already compromised, it may be possible for the attacker to try to compromise other computers in your home network by checking for vulnerable DHCP clients calling a Bash shell. Well, if your router is already lost, there are a many more attacks possible, of course, but removing the possibility to do this in the DHCP-client-calling-Bash case is still advisable.
Some tests can tell you which (if any) of the known bugs your Bash features [2].
While you are updating Bash, you should also check which remote accessible services are running on your computer and decide if you really need them. You can get a list of servers, together with the running program names, on your computer using this command (see Listing 1 for sample output):
Listing 1
Output of sudo netstat -tulpen.
sudo netstat -tulpen
Programs running only on interface 127.0.0.1 (localhost) are usually harmless, whereas you should double-check everything running on the "match-all" address 0.0.0.0, because these are potentially accessible from the Internet.
The worldwide-open ports (marked in yellow in Listing 1) include an NFS server and LibreOffice remote presentation control port, which should be checked. The DHCP client (dhclient, marked in green) ports need to be open for renewal or termination notifications and transfer of update notifications from the DHCP server. Locally running CUPS and name server cache (named) are OK.
Flash Bug?
Installation of the Flash player does not work using the browser. Is this a bug?
Some websites claim that you can install the proprietary Flash plugin for displaying flash web content as a simple browser extension. However, it's actually not that easy, because security restrictions keep your browser from installing programs and libraries system-wide.
Many websites formerly requiring Flash, now work without special plugins using HTML5 canvases, and the browser will take care of starting the correct video player.
However, older content may still require the proprietary Flash browser plugin. On Debian-based systems, you can install it with
sudo apt-get update sudo apt-get install -t unstable flashplugin-nonfree
or try to update with
sudo update-flashplugin-nonfree --install
or you can check the plugin status with
sudo update-flashplugin-nonfree --status
You might also consider checking whether the alternative free Flash video plugin works for you, which is the package browser-plugin-lightspark in Debian.
Infos
- Shellshock: http://en.wikipedia.org/wiki/Shellshock_(software_bug)
- Bash tests: https://shellshocker.net/
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Latest Cinnamon Desktop Releases with a Bold New Look
Just in time for the holidays, the developer of the Cinnamon desktop has shipped a new release to help spice up your eggnog with new features and a new look.
-
Armbian 24.11 Released with Expanded Hardware Support
If you've been waiting for Armbian to support OrangePi 5 Max and Radxa ROCK 5B+, the wait is over.
-
SUSE Renames Several Products for Better Name Recognition
SUSE has been a very powerful player in the European market, but it knows it must branch out to gain serious traction. Will a name change do the trick?
-
ESET Discovers New Linux Malware
WolfsBane is an all-in-one malware that has hit the Linux operating system and includes a dropper, a launcher, and a backdoor.
-
New Linux Kernel Patch Allows Forcing a CPU Mitigation
Even when CPU mitigations can consume precious CPU cycles, it might not be a bad idea to allow users to enable them, even if your machine isn't vulnerable.
-
Red Hat Enterprise Linux 9.5 Released
Notify your friends, loved ones, and colleagues that the latest version of RHEL is available with plenty of enhancements.
-
Linux Sees Massive Performance Increase from a Single Line of Code
With one line of code, Intel was able to increase the performance of the Linux kernel by 4,000 percent.
-
Fedora KDE Approved as an Official Spin
If you prefer the Plasma desktop environment and the Fedora distribution, you're in luck because there's now an official spin that is listed on the same level as the Fedora Workstation edition.
-
New Steam Client Ups the Ante for Linux
The latest release from Steam has some pretty cool tricks up its sleeve.
-
Gnome OS Transitioning Toward a General-Purpose Distro
If you're looking for the perfectly vanilla take on the Gnome desktop, Gnome OS might be for you.