El Thu, 25 Sep 2014 13:27:02 -0300, Fabián Bonetti escribió: > Pre-udate: > > root@debian:~# env x='() { :;}; echo vulnerable' bash -c "echo this is a > test" > vulnerable this is a test root@debian:~# > > Post-update: > > root@debian:~# env x='() { :;}; echo vulnerable' bash -c "echo this is a > test" > bash: warning: x: ignoring function definition attempt bash: error > importing function definition for `x' > this is a test > > > Fuente > http://www.murga-linux.com/puppy/viewtopic.php?p=800655#800655
Eso es para el primer parche. Queda el segundo: https://security-tracker.debian.org/tracker/CVE-2014-7169 Saludos, -- Camaleón -- To UNSUBSCRIBE, email to debian-user-spanish-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/pan.2014.09.25.16.56...@gmail.com