Bash Bug - CVE-2014-6271

Aggiornate tutti, Bash, nei vostri server Linux!

Oggi tutti ne parlano, dopo Heartbleed questo nuovo bug, darà un sacco di grattacapi ad un sacco di amministratori!

Per testare le vostre bash e capire se sono vulnerabili:

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

env x='() { :;}; echo vulnerable' sh -c "echo this is a test"



Annuncio DEBIAN:
https://lists.debian.org/debian-security-announce/2014/msg00220.html


Package        : bash
CVE ID         : CVE-2014-6271

Stephane Chazelas discovered a vulnerability in bash, the GNU
Bourne-Again Shell, related to how environment variables are
processed.  In many common configurations, this vulnerability is
exploitable over the network, especially if bash has been configured
as the system shell.

For the stable distribution (wheezy), this problem has been fixed in
version 4.2+dfsg-0.1+deb7u1.

We recommend that you upgrade your bash packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


Comandi utili per l'aggiornamento:

CentOS:
yum update

Debian:
apt-get update
apt-get install --only-upgrade bash



Commenti

Post popolari in questo blog

SugarCRM: Cambiare la larghezza delle colonne della Dashboard

Nano - PHP, HTML e CSS syntax highlighting

NetBeans IDE 7.2.1 PHP in Windows XP non si riavvia