Bash Bug - CVE-2014-6271

Aggiornate tutti, Bash, nei vostri server Linux!

Oggi tutti ne parlano, dopo Heartbleed questo nuovo bug, darà un sacco di grattacapi ad un sacco di amministratori!

Per testare le vostre bash e capire se sono vulnerabili:

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

env x='() { :;}; echo vulnerable' sh -c "echo this is a test"

Annuncio DEBIAN:

Package        : bash
CVE ID         : CVE-2014-6271

Stephane Chazelas discovered a vulnerability in bash, the GNU
Bourne-Again Shell, related to how environment variables are
processed.  In many common configurations, this vulnerability is
exploitable over the network, especially if bash has been configured
as the system shell.

For the stable distribution (wheezy), this problem has been fixed in
version 4.2+dfsg-0.1+deb7u1.

We recommend that you upgrade your bash packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:

Comandi utili per l'aggiornamento:

yum update

apt-get update
apt-get install --only-upgrade bash


Post popolari in questo blog

Chrome - Application Cache Error event: Invalid or missing manifest origin trial token

Google App Engine PHP Runtime

Nano - PHP, HTML e CSS syntax highlighting