* [dora] [PATCH 0/3] fixes for bash and apmd
@ 2014-10-02 7:07 Robert Yang
2014-10-02 7:07 ` [PATCH 1/3] apmd.service: Fix typo (not mandatory EnvironmentFile prefix) Robert Yang
` (2 more replies)
0 siblings, 3 replies; 7+ messages in thread
From: Robert Yang @ 2014-10-02 7:07 UTC (permalink / raw)
To: openembedded-core
The following changes since commit 5c51dd2e9bab54013652475888554bc4660dcff3:
qt4: Fix Qt 4.8.5 source to new location (2014-08-11 12:08:03 +0100)
are available in the git repository at:
git://git.openembedded.org/openembedded-core-contrib robert/dora-next
http://cgit.openembedded.org/cgit.cgi/openembedded-core-contrib/log/?h=robert/dora-next
Khem Raj (1):
bash: Fix CVE-2014-7169
Ross Burton (1):
bash: fix CVE-2014-6271
Tobias Blom (1):
apmd.service: Fix typo (not mandatory EnvironmentFile prefix)
meta/recipes-bsp/apmd/apmd-3.2.2-14/apmd.service | 2 +-
.../bash/bash-3.2.48/cve-2014-6271.patch | 77 ++++++++++++++++++++
.../bash/bash-3.2.48/cve-2014-7169.patch | 16 ++++
meta/recipes-extended/bash/bash_3.2.48.bb | 2 +
4 files changed, 96 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-extended/bash/bash-3.2.48/cve-2014-6271.patch
create mode 100644 meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
--
1.7.9.5
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 1/3] apmd.service: Fix typo (not mandatory EnvironmentFile prefix)
2014-10-02 7:07 [dora] [PATCH 0/3] fixes for bash and apmd Robert Yang
@ 2014-10-02 7:07 ` Robert Yang
2014-10-02 7:07 ` [PATCH 2/3] bash: fix CVE-2014-6271 Robert Yang
2014-10-02 7:07 ` [PATCH 3/3] bash: Fix CVE-2014-7169 Robert Yang
2 siblings, 0 replies; 7+ messages in thread
From: Robert Yang @ 2014-10-02 7:07 UTC (permalink / raw)
To: openembedded-core
From: Tobias Blom <tobias.blom@techne-dev.se>
Prefix to EnvironmentFile should be preciding the filenamn.
(From OE-Core rev: 1f694e4cb493b0737b6009382c0957e6837ebbed)
Signed-off-by: Tobias Blom <tobias.blom@techne-dev.se>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
---
meta/recipes-bsp/apmd/apmd-3.2.2-14/apmd.service | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-bsp/apmd/apmd-3.2.2-14/apmd.service b/meta/recipes-bsp/apmd/apmd-3.2.2-14/apmd.service
index 62d6af1..ffab823 100644
--- a/meta/recipes-bsp/apmd/apmd-3.2.2-14/apmd.service
+++ b/meta/recipes-bsp/apmd/apmd-3.2.2-14/apmd.service
@@ -3,5 +3,5 @@ Description=Advanced Power Management daemon
After=remote-fs.target
[Service]
-EnvironmentFile-= @SYSCONFDIR@/default/apmd
+EnvironmentFile=-@SYSCONFDIR@/default/apmd
ExecStart=@SBINDIR@/apmd -P @SYSCONFDIR@/apm/apmd_proxy $APMD
--
1.7.9.5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH 2/3] bash: fix CVE-2014-6271
2014-10-02 7:07 [dora] [PATCH 0/3] fixes for bash and apmd Robert Yang
2014-10-02 7:07 ` [PATCH 1/3] apmd.service: Fix typo (not mandatory EnvironmentFile prefix) Robert Yang
@ 2014-10-02 7:07 ` Robert Yang
2014-10-02 7:07 ` [PATCH 3/3] bash: Fix CVE-2014-7169 Robert Yang
2 siblings, 0 replies; 7+ messages in thread
From: Robert Yang @ 2014-10-02 7:07 UTC (permalink / raw)
To: openembedded-core
From: Ross Burton <ross.burton@intel.com>
CVE-2014-6271 aka ShellShock.
"GNU Bash through 4.3 processes trailing strings after function definitions in
the values of environment variables, which allows remote attackers to execute
arbitrary code via a crafted environment."
(From OE-Core master rev: 798d833c9d4bd9ab287fa86b85b4d5f128170ed3)
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
---
.../bash/bash-3.2.48/cve-2014-6271.patch | 77 ++++++++++++++++++++
meta/recipes-extended/bash/bash_3.2.48.bb | 1 +
2 files changed, 78 insertions(+)
create mode 100644 meta/recipes-extended/bash/bash-3.2.48/cve-2014-6271.patch
diff --git a/meta/recipes-extended/bash/bash-3.2.48/cve-2014-6271.patch b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-6271.patch
new file mode 100644
index 0000000..7226ffb
--- /dev/null
+++ b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-6271.patch
@@ -0,0 +1,77 @@
+Fix CVE-2014-6271, aka ShellShock.
+
+Upstream-Status: Backport
+Signed-off-by: Ross Burton <ross.burton@intel.com>
+
+*** ../bash-3.2.51/builtins/common.h 2006-03-06 09:38:44.000000000 -0500
+--- builtins/common.h 2014-09-16 19:08:02.000000000 -0400
+***************
+*** 34,37 ****
+--- 34,39 ----
+
+ /* Flags for describe_command, shared between type.def and command.def */
++ #define SEVAL_FUNCDEF 0x080 /* only allow function definitions */
++ #define SEVAL_ONECMD 0x100 /* only allow a single command */
+ #define CDESC_ALL 0x001 /* type -a */
+ #define CDESC_SHORTDESC 0x002 /* command -V */
+*** ../bash-3.2.51/builtins/evalstring.c 2008-11-15 17:47:04.000000000 -0500
+--- builtins/evalstring.c 2014-09-16 19:08:02.000000000 -0400
+***************
+*** 235,238 ****
+--- 235,246 ----
+ struct fd_bitmap *bitmap;
+
++ if ((flags & SEVAL_FUNCDEF) && command->type != cm_function_def)
++ {
++ internal_warning ("%s: ignoring function definition attempt", from_file);
++ should_jump_to_top_level = 0;
++ last_result = last_command_exit_value = EX_BADUSAGE;
++ break;
++ }
++
+ bitmap = new_fd_bitmap (FD_BITMAP_SIZE);
+ begin_unwind_frame ("pe_dispose");
+***************
+*** 292,295 ****
+--- 300,306 ----
+ dispose_fd_bitmap (bitmap);
+ discard_unwind_frame ("pe_dispose");
++
++ if (flags & SEVAL_ONECMD)
++ break;
+ }
+ }
+*** ../bash-3.2.51/variables.c 2008-11-15 17:15:06.000000000 -0500
+--- variables.c 2014-09-16 19:10:39.000000000 -0400
+***************
+*** 319,328 ****
+ strcpy (temp_string + char_index + 1, string);
+
+! parse_and_execute (temp_string, name, SEVAL_NONINT|SEVAL_NOHIST);
+!
+! /* Ancient backwards compatibility. Old versions of bash exported
+! functions like name()=() {...} */
+! if (name[char_index - 1] == ')' && name[char_index - 2] == '(')
+! name[char_index - 2] = '\0';
+
+ if (temp_var = find_function (name))
+--- 319,326 ----
+ strcpy (temp_string + char_index + 1, string);
+
+! /* Don't import function names that are invalid identifiers from the
+! environment. */
+! if (legal_identifier (name))
+! parse_and_execute (temp_string, name, SEVAL_NONINT|SEVAL_NOHIST|SEVAL_FUNCDEF|SEVAL_ONECMD);
+
+ if (temp_var = find_function (name))
+***************
+*** 333,340 ****
+ else
+ report_error (_("error importing function definition for `%s'"), name);
+-
+- /* ( */
+- if (name[char_index - 1] == ')' && name[char_index - 2] == '\0')
+- name[char_index - 2] = '('; /* ) */
+ }
+ #if defined (ARRAY_VARS)
+--- 331,334 ----
diff --git a/meta/recipes-extended/bash/bash_3.2.48.bb b/meta/recipes-extended/bash/bash_3.2.48.bb
index fe04b28..5849ed0 100644
--- a/meta/recipes-extended/bash/bash_3.2.48.bb
+++ b/meta/recipes-extended/bash/bash_3.2.48.bb
@@ -12,6 +12,7 @@ SRC_URI = "${GNU_MIRROR}/bash/bash-${PV}.tar.gz;name=tarball \
file://mkbuiltins_have_stringize.patch \
file://build-tests.patch \
file://test-output.patch \
+ file://cve-2014-6271.patch;striplevel=0 \
file://run-ptest \
"
--
1.7.9.5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH 3/3] bash: Fix CVE-2014-7169
2014-10-02 7:07 [dora] [PATCH 0/3] fixes for bash and apmd Robert Yang
2014-10-02 7:07 ` [PATCH 1/3] apmd.service: Fix typo (not mandatory EnvironmentFile prefix) Robert Yang
2014-10-02 7:07 ` [PATCH 2/3] bash: fix CVE-2014-6271 Robert Yang
@ 2014-10-02 7:07 ` Robert Yang
2014-10-02 12:28 ` Paul Eggleton
2 siblings, 1 reply; 7+ messages in thread
From: Robert Yang @ 2014-10-02 7:07 UTC (permalink / raw)
To: openembedded-core
From: Khem Raj <raj.khem@gmail.com>
This is a followup patch to incomplete CVE-2014-6271 fix
code execution via specially-crafted environment
Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
(From OE-Core master rev: 76a2d6b83472995edbe967aed80f0fcbb784b3fc)
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
---
.../bash/bash-3.2.48/cve-2014-7169.patch | 16 ++++++++++++++++
meta/recipes-extended/bash/bash_3.2.48.bb | 1 +
2 files changed, 17 insertions(+)
create mode 100644 meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
diff --git a/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
new file mode 100644
index 0000000..2e734de
--- /dev/null
+++ b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
@@ -0,0 +1,16 @@
+Taken from http://www.openwall.com/lists/oss-security/2016/09/25/10
+
+Upstream-Status: Backport
+Index: bash-3.2.48/parse.y
+===================================================================
+--- bash-3.2.48.orig/parse.y 2008-04-29 18:24:55.000000000 -0700
++++ bash-3.2.48/parse.y 2014-09-26 13:07:31.956080056 -0700
+@@ -2503,6 +2503,8 @@
+ FREE (word_desc_to_read);
+ word_desc_to_read = (WORD_DESC *)NULL;
+
++ eol_ungetc_lookahead = 0;
++
+ last_read_token = '\n';
+ token_to_read = '\n';
+ }
diff --git a/meta/recipes-extended/bash/bash_3.2.48.bb b/meta/recipes-extended/bash/bash_3.2.48.bb
index 5849ed0..e6a04cd 100644
--- a/meta/recipes-extended/bash/bash_3.2.48.bb
+++ b/meta/recipes-extended/bash/bash_3.2.48.bb
@@ -13,6 +13,7 @@ SRC_URI = "${GNU_MIRROR}/bash/bash-${PV}.tar.gz;name=tarball \
file://build-tests.patch \
file://test-output.patch \
file://cve-2014-6271.patch;striplevel=0 \
+ file://cve-2014-7169.patch \
file://run-ptest \
"
--
1.7.9.5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH 3/3] bash: Fix CVE-2014-7169
2014-10-02 7:07 ` [PATCH 3/3] bash: Fix CVE-2014-7169 Robert Yang
@ 2014-10-02 12:28 ` Paul Eggleton
2014-10-02 14:28 ` Paul Eggleton
0 siblings, 1 reply; 7+ messages in thread
From: Paul Eggleton @ 2014-10-02 12:28 UTC (permalink / raw)
To: Robert Yang; +Cc: openembedded-core
On Thursday 02 October 2014 00:07:41 Robert Yang wrote:
> From: Khem Raj <raj.khem@gmail.com>
>
> This is a followup patch to incomplete CVE-2014-6271 fix
> code execution via specially-crafted environment
>
> Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
> (From OE-Core master rev: 76a2d6b83472995edbe967aed80f0fcbb784b3fc)
>
> Signed-off-by: Khem Raj <raj.khem@gmail.com>
> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
> ---
> .../bash/bash-3.2.48/cve-2014-7169.patch | 16 ++++++++++++++++
> meta/recipes-extended/bash/bash_3.2.48.bb | 1 +
> 2 files changed, 17 insertions(+)
> create mode 100644
> meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
>
> diff --git a/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
> b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch new file mode
> 100644
> index 0000000..2e734de
> --- /dev/null
> +++ b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
> @@ -0,0 +1,16 @@
> +Taken from http://www.openwall.com/lists/oss-security/2016/09/25/10
> +
> +Upstream-Status: Backport
> +Index: bash-3.2.48/parse.y
> +===================================================================
> +--- bash-3.2.48.orig/parse.y 2008-04-29 18:24:55.000000000 -0700
> ++++ bash-3.2.48/parse.y 2014-09-26 13:07:31.956080056 -0700
> +@@ -2503,6 +2503,8 @@
> + FREE (word_desc_to_read);
> + word_desc_to_read = (WORD_DESC *)NULL;
> +
> ++ eol_ungetc_lookahead = 0;
> ++
> + last_read_token = '\n';
> + token_to_read = '\n';
> + }
> diff --git a/meta/recipes-extended/bash/bash_3.2.48.bb
> b/meta/recipes-extended/bash/bash_3.2.48.bb index 5849ed0..e6a04cd 100644
> --- a/meta/recipes-extended/bash/bash_3.2.48.bb
> +++ b/meta/recipes-extended/bash/bash_3.2.48.bb
> @@ -13,6 +13,7 @@ SRC_URI =
> "${GNU_MIRROR}/bash/bash-${PV}.tar.gz;name=tarball \
> file://build-tests.patch \
> file://test-output.patch \
> file://cve-2014-6271.patch;striplevel=0 \
> + file://cve-2014-7169.patch \
> file://run-ptest \
> "
Unfortunately these two only patch the 3.x version of the bash recipe, leaving
the 4.x version unpatched.
Cheers,
Paul
--
Paul Eggleton
Intel Open Source Technology Centre
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 3/3] bash: Fix CVE-2014-7169
2014-10-02 12:28 ` Paul Eggleton
@ 2014-10-02 14:28 ` Paul Eggleton
2014-10-08 3:53 ` Robert Yang
0 siblings, 1 reply; 7+ messages in thread
From: Paul Eggleton @ 2014-10-02 14:28 UTC (permalink / raw)
To: Robert Yang; +Cc: openembedded-core
On Thursday 02 October 2014 13:28:54 Paul Eggleton wrote:
> On Thursday 02 October 2014 00:07:41 Robert Yang wrote:
> > From: Khem Raj <raj.khem@gmail.com>
> >
> > This is a followup patch to incomplete CVE-2014-6271 fix
> > code execution via specially-crafted environment
> >
> > Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
> > (From OE-Core master rev: 76a2d6b83472995edbe967aed80f0fcbb784b3fc)
> >
> > Signed-off-by: Khem Raj <raj.khem@gmail.com>
> > Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
> > Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
> > ---
> >
> > .../bash/bash-3.2.48/cve-2014-7169.patch | 16
> > ++++++++++++++++
> > meta/recipes-extended/bash/bash_3.2.48.bb | 1 +
> > 2 files changed, 17 insertions(+)
> > create mode 100644
> >
> > meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
> >
> > diff --git a/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
> > b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch new file mode
> > 100644
> > index 0000000..2e734de
> > --- /dev/null
> > +++ b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
> > @@ -0,0 +1,16 @@
> > +Taken from http://www.openwall.com/lists/oss-security/2016/09/25/10
> > +
> > +Upstream-Status: Backport
> > +Index: bash-3.2.48/parse.y
> > +===================================================================
> > +--- bash-3.2.48.orig/parse.y 2008-04-29 18:24:55.000000000 -0700
> > ++++ bash-3.2.48/parse.y 2014-09-26 13:07:31.956080056 -0700
> > +@@ -2503,6 +2503,8 @@
> > + FREE (word_desc_to_read);
> > + word_desc_to_read = (WORD_DESC *)NULL;
> > +
> > ++ eol_ungetc_lookahead = 0;
> > ++
> > + last_read_token = '\n';
> > + token_to_read = '\n';
> > + }
> > diff --git a/meta/recipes-extended/bash/bash_3.2.48.bb
> > b/meta/recipes-extended/bash/bash_3.2.48.bb index 5849ed0..e6a04cd 100644
> > --- a/meta/recipes-extended/bash/bash_3.2.48.bb
> > +++ b/meta/recipes-extended/bash/bash_3.2.48.bb
> > @@ -13,6 +13,7 @@ SRC_URI =
> > "${GNU_MIRROR}/bash/bash-${PV}.tar.gz;name=tarball \
> > file://build-tests.patch \
> >
> > file://test-output.patch \
> > file://cve-2014-6271.patch;striplevel=0 \
> >
> > + file://cve-2014-7169.patch \
> >
> > file://run-ptest \
> >
> > "
>
> Unfortunately these two only patch the 3.x version of the bash recipe,
> leaving the 4.x version unpatched.
I have just sent fixes for this.
Cheers,
Paul
--
Paul Eggleton
Intel Open Source Technology Centre
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 3/3] bash: Fix CVE-2014-7169
2014-10-02 14:28 ` Paul Eggleton
@ 2014-10-08 3:53 ` Robert Yang
0 siblings, 0 replies; 7+ messages in thread
From: Robert Yang @ 2014-10-08 3:53 UTC (permalink / raw)
To: Paul Eggleton; +Cc: openembedded-core
On 10/02/2014 10:28 PM, Paul Eggleton wrote:
> On Thursday 02 October 2014 13:28:54 Paul Eggleton wrote:
>> On Thursday 02 October 2014 00:07:41 Robert Yang wrote:
>>> From: Khem Raj <raj.khem@gmail.com>
>>>
>>> This is a followup patch to incomplete CVE-2014-6271 fix
>>> code execution via specially-crafted environment
>>>
>>> Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
>>> (From OE-Core master rev: 76a2d6b83472995edbe967aed80f0fcbb784b3fc)
>>>
>>> Signed-off-by: Khem Raj <raj.khem@gmail.com>
>>> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
>>> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
>>> ---
>>>
>>> .../bash/bash-3.2.48/cve-2014-7169.patch | 16
>>> ++++++++++++++++
>>> meta/recipes-extended/bash/bash_3.2.48.bb | 1 +
>>> 2 files changed, 17 insertions(+)
>>> create mode 100644
>>>
>>> meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
>>>
>>> diff --git a/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
>>> b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch new file mode
>>> 100644
>>> index 0000000..2e734de
>>> --- /dev/null
>>> +++ b/meta/recipes-extended/bash/bash-3.2.48/cve-2014-7169.patch
>>> @@ -0,0 +1,16 @@
>>> +Taken from http://www.openwall.com/lists/oss-security/2016/09/25/10
>>> +
>>> +Upstream-Status: Backport
>>> +Index: bash-3.2.48/parse.y
>>> +===================================================================
>>> +--- bash-3.2.48.orig/parse.y 2008-04-29 18:24:55.000000000 -0700
>>> ++++ bash-3.2.48/parse.y 2014-09-26 13:07:31.956080056 -0700
>>> +@@ -2503,6 +2503,8 @@
>>> + FREE (word_desc_to_read);
>>> + word_desc_to_read = (WORD_DESC *)NULL;
>>> +
>>> ++ eol_ungetc_lookahead = 0;
>>> ++
>>> + last_read_token = '\n';
>>> + token_to_read = '\n';
>>> + }
>>> diff --git a/meta/recipes-extended/bash/bash_3.2.48.bb
>>> b/meta/recipes-extended/bash/bash_3.2.48.bb index 5849ed0..e6a04cd 100644
>>> --- a/meta/recipes-extended/bash/bash_3.2.48.bb
>>> +++ b/meta/recipes-extended/bash/bash_3.2.48.bb
>>> @@ -13,6 +13,7 @@ SRC_URI =
>>> "${GNU_MIRROR}/bash/bash-${PV}.tar.gz;name=tarball \
>>> file://build-tests.patch \
>>>
>>> file://test-output.patch \
>>> file://cve-2014-6271.patch;striplevel=0 \
>>>
>>> + file://cve-2014-7169.patch \
>>>
>>> file://run-ptest \
>>>
>>> "
>>
>> Unfortunately these two only patch the 3.x version of the bash recipe,
>> leaving the 4.x version unpatched.
>
> I have just sent fixes for this.
>
Thank you very much, I just came back from the holiday.
// Robert
> Cheers,
> Paul
>
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2014-10-08 3:53 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-10-02 7:07 [dora] [PATCH 0/3] fixes for bash and apmd Robert Yang
2014-10-02 7:07 ` [PATCH 1/3] apmd.service: Fix typo (not mandatory EnvironmentFile prefix) Robert Yang
2014-10-02 7:07 ` [PATCH 2/3] bash: fix CVE-2014-6271 Robert Yang
2014-10-02 7:07 ` [PATCH 3/3] bash: Fix CVE-2014-7169 Robert Yang
2014-10-02 12:28 ` Paul Eggleton
2014-10-02 14:28 ` Paul Eggleton
2014-10-08 3:53 ` Robert Yang
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox