/srv/irclogs.ubuntu.com/2014/09/25/#ubuntu+1.txt

=== Drone`` is now known as Drone`
=== Guest69740 is now known as magic
=== magic is now known as Guest20981
=== Guest20981 is now known as magic
MoPacHello. Trying to figure out whether my current kernel version should or shouldn't contain a patch that was "released" into Utopic this month. (https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1365378)05:11
ubottuLaunchpad bug 1365378 in linux (Ubuntu Trusty) "[Regression] realtek pci-e card readers don't recognize mmc cards" [High,Fix committed]05:12
MoPacMy OS doesn't recognize SD cards, and I don't know if I lack this fix or if it's just not working for me05:12
lordievaderGood morning.07:26
elfymorning lordievader07:28
lordievaderHey elfy, how are you?07:28
elfypretty good thanks :) just updated bash and did firefox while I had proposed enabled07:29
lordievaderThe CVE?07:30
elfybash one? if so I guess so - not read that07:30
lordievaderelfy: There was a exploit discovered yesterday.07:31
lordievaderhttp://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html07:31
ubottuGNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP client... (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271)07:31
elfyyea that one lordievader07:31
lordievaderLets see if I need to recompile bash...07:32
elfyI don't compile :)07:32
lordievaderelfy: I run Gentoo as my main OS ;)07:32
elfyunless I really need to that is07:32
elfyheh :)07:33
BluesKajHey folks10:53
=== xubuntu is now known as Guest65316
=== magic is now known as Guest26178
HFSPLUSikonia, noooooooooo waaaaaaaaaaaa17:41
elfythanks ikonia17:45
xubuntu48whi17:55
xubuntu48wI did not found updates for firefox 32 and TB and for bash in xubuntu 14.10. Is it frozen?17:55
BluesKaj14.10 is on a freeze atm17:57
xubuntu48wwhy? how can I get security updates ?17:57
lordievader!info bash trusty17:58
ubottubash (source: bash): GNU Bourne Again SHell. In component main, is required. Version 4.3-7ubuntu1.1 (trusty), package size 535 kB, installed size 1436 kB17:58
lordievader!info bash utopic17:58
ubottubash (source: bash): GNU Bourne Again SHell. In component main, is required. Version 4.3-9ubuntu1 (utopic), package size 577 kB, installed size 1552 kB17:58
ikoniayou wait for the fix17:58
ikoniayou shouldn't be running these in prodution, so it shouldn' tbe an issue17:58
ikoniaif you're really concerned close down the machines until a fix is released17:59
xubuntu48wok thx. but I needed the 3.16 kernel because of grafik card17:59
ikoniadoesn't change what I said18:00
xubuntu48wthx18:00
elfythought they were releasing it18:01
ikoniano idea18:01
ikoniathe things people say, and the things they do are too seperate things18:01
elfysaw some chat in -release an hour or so ago18:01
ikoniabut depending on it for a pre-release distro = your problem18:01
ikoniaI'm sure they actually will respond to the bash one quickly18:01
elfyindeed that is so ikonia18:01
elfyand yes I totally agree :)18:02
elfyat the end of the day - imho - someone running a dev version should be able to pick an updated package from -proposed if it's there - which it was 12 hours ago18:03
ikoniaI don't disagree18:03
jtaylorhave there really been no utopic updates since yesterday?20:19
jtayloror is my mirror just broken :/20:20
lordievaderI heard something about a freeze, probably just that.20:20
lordievaderhttps://wiki.ubuntu.com/FeatureFreeze20:21
genii!schedule20:28
ubottuA schedule of Utopic Unicorn (14.10) release milestones can be found here: https://wiki.ubuntu.com/UtopicUnicorn/ReleaseSchedule20:28
geniiNote on the schedule, Sept 25: Final Beta Freeze, Final Beta20:29
BluesKajis he bash vulnerability going to be patched in 14.10 ?20:34
BluesKajthe20:34
elfyBluesKaj: it's in proposed - they were talking about it earlier in -release20:34
elfybut it is installable from proposed if you want to20:35
BluesKajok thanks elfy20:35
BluesKajguess I'll take a chance on proposed20:35
elfyas is firefox20:35
elfyworked ok for me 14 hours ago20:36
BluesKajright20:36
BluesKajgot the deb handy elfy ?20:36
elfywell I've got it here somewhere lol20:37
TJ-BluesKaj: https://launchpad.net/ubuntu/+source/bash/4.3-9ubuntu220:38
BluesKajTJ-, thanks20:39
elfyBluesKaj: sorry - not thinking properly here - it's been a long day :)20:42
Nothing_MuchSo I'm on Utopic... and I'm getting this error trying to launch testdrive-gtk :( https://bugs.launchpad.net/ubuntu/+source/pyrenamer/+bug/136374821:06
ubottuLaunchpad bug 1363748 in pyrenamer (Ubuntu) "Utopic crash on launch; "Attempt to unlock mutex that was not locked"" [Undecided,Confirmed]21:06
BluesKajok bash patch, configured, compiled and installed on 2 linux machines ...wonder if I can find one for the router21:49
BluesKajheh, configured compiles and installed the so called bash patch , but the check command says my system is still vulnerable, wth is going on?22:30
rwwBluesKaj: there are two CVEs for two bash bugs, one of which is an extension of the other. Perhaps you didn't patch both.22:47
rwwMeanwhile in normal person land, Ubuntu received security updates for both already ;)22:48
BluesKajrww, I ran the updates yesterday , but the check command still shows me as vulnerable22:49
rww22:31:14 < mdeslaur> I pushed out CVE-2014-7169 about 10 minutes ago22:49
ubottuGNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apac... (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169)22:49
rwwokay, that CVE detection thing is starting to get annoying22:49
rwwBluesKaj: (it's currently 22:49)22:49
BluesKaji was told it would come down the pipe if i had the proposed repo, but it wasn't specified which proposed .. so I'm stumped , there's gotta be one available22:55
rwwutopic-proposed, I expect22:55
BluesKajmain or....?22:55
rwwbash is in main, yes22:56
rwwLaunchpad doesn't show the second one in utopic-proposed yet, though.22:57
rwwso, you know, that'll come when it comes. downside of using a development version that isn't intended for production ;)22:57
TJ-It's in the ubuntu-security-proposed PPA, read the USN CVE report22:57
TJ-http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-7169.html22:57
ubottuGNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apac... (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169)22:57
rwwah, I fail. thanks TJ- :)22:57
k1l_https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages  that only links to 10..04,12.04,14.0422:58
TJ-Makes sense, seeing as Utopic is in development still ... no one is using it for Production, right?22:59
k1l_*cough* no, no one23:00
TJ-;-p23:00
rww"Pre-release versions are unstable and will probably break your computer somehow." ~ some hot person who wrote /topic23:00
rwwshould probably have added "may eat your cat"23:00
TJ-It's not like most server installs will be vulnerable anyhow, if they haven't changed the default shell from dash, especially for system services23:02
optihas this whole bash fiasco slowed up the beta release?23:31

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!