Discussion:
What's the real story about Shellshock and Bash and vulnerabilities in Linux and OpenSource?
Ian
2014-09-25 21:11:03 UTC
Permalink
The journos are having a field day over the discovery of the
vulnerabilities in Bash, the vulnerability now called Shellshock. They talk
of 500million affected sites. Any Apache server is easily taken over. Some
reporting that the patches not fully safe yet.
http://www.bbc.com/news/technology-29361794
"The new bug has turned the spotlight, once again, onto the reliance the
technology industry has on products built and maintained by small teams
often made up of volunteers."
And even more fingers being pointed at the Open Source community,
"That such key parts of everyday technology are maintained in this way is
a cause for concern," said Tony Dyhouse from the UK's Trustworthy Security
Initiative.

"To achieve a more stable and secure technology environment in which
businesses and individuals can feel truly safe, we have to peel back the
layers, start at the bottom and work up," he said."This is utterly
symptomatic of the historic neglect we have seen for the development of a
dependable and trustworthy baseline upon which to develop a software
infrastructure for the UK.
"Ultimately, this is a lifecycle problem. It's here because people are
making mistakes whilst writing code and making further mistakes when
patching the original problems."
"
What is the real story? How vulnerable are our servers? Will the patches
resolve the problem?

Should there be a focus within the Linux world to track down all the little
bits that make up the foundation of the software and making sure they are
being maintained and secure and above all trusted? Perhaps LA or the next
LCA could/should pick this up as a theme and be a leader in the open source
world?
--
-- Ian
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.linuxsa.org.au/pipermail/linuxsa/attachments/20140926/e9ff365c/attachment.html
Kim Hawtin
2014-09-26 02:22:47 UTC
Permalink
Post by Ian
The journos are having a field day over the discovery of the
vulnerabilities in Bash, the vulnerability now called Shellshock.
shock horror, move to dash or zsh or something.
Post by Ian
They
talk of 500million affected sites. Any Apache server is easily taken
over. Some reporting that the patches not fully safe yet.
http://www.bbc.com/news/technology-29361794
"The new bug has turned the spotlight, once again, onto the reliance the
technology industry has on products built and maintained by small teams
often made up of volunteers."
And even more fingers being pointed at the Open Source community,
"That such key parts of everyday technology are maintained in this way
is a cause for concern," said Tony Dyhouse from the UK's Trustworthy
Security Initiative.
What a marketing coup for commercial software companies!

Oh wait, lots of them use these same packages too ...
Post by Ian
"To achieve a more stable and secure technology environment in which
businesses and individuals can feel truly safe, we have to peel back the
layers, start at the bottom and work up," he said."This is utterly
symptomatic of the historic neglect we have seen for the development of
a dependable and trustworthy baseline upon which to develop a software
infrastructure for the UK.
"Ultimately, this is a lifecycle problem. It's here because people are
making mistakes whilst writing code and making further mistakes when
patching the original problems."
Ultimately the free software and open source world isn't getting the
support it needs from the commercial world that sits atop its success.
Post by Ian
"What is the real story? How vulnerable are our servers? Will the patches
resolve the problem?
Nothing like a little bit of hysteria to drive up hits to their sites
and raise the ad revenue. Not like any of the popular news sites write
their own content or do nearly enough research about the topics ...
Post by Ian
Should there be a focus within the Linux world to track down all the
little bits that make up the foundation of the software and making sure
they are being maintained and secure and above all trusted? Perhaps LA
or the next LCA could/should pick this up as a theme and be a leader in
the open source world?
Yes, events like OSDC and LCA are good places to discuss this first
hand. This should get into action before then of course.

regards,

Kim

Loading...