El Thu, 25 Sep 2014 13:27:02 -0300, Fabián Bonetti escribió:

> Pre-udate:
> 
> root@debian:~# env x='() { :;}; echo vulnerable' bash -c "echo this is a
> test"
> vulnerable this is a test root@debian:~#
> 
> Post-update:
> 
> root@debian:~# env x='() { :;}; echo vulnerable' bash -c "echo this is a
> test"
> bash: warning: x: ignoring function definition attempt bash: error
> importing function definition for `x'
> this is a test
> 
> 
> Fuente > http://www.murga-linux.com/puppy/viewtopic.php?p=800655#800655

Eso es para el primer parche. Queda el segundo:

https://security-tracker.debian.org/tracker/CVE-2014-7169

Saludos,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-spanish-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/pan.2014.09.25.16.56...@gmail.com

Responder a