Hello

This weakness than is sufficient to protect them do as follows.

apt-get update and apt-get install --only-package bash

On Thu, Sep 25, 2014 at 10:18 AM, Håkon Alstadheim
<ha...@alstadheim.priv.no> wrote:
> According to
> <https://secure.dshield.org/forums/diary/Attention+NIX+admins+time+to+patch/18703>:
> Red Hat has become aware that the patch for CVE-2014-6271 is incomplete. An
> attacker can provide specially-crafted environment variables containing
> arbitrary commands that will be executed on vulnerable systems under certain
> conditions. The new issue has been assigned CVE-2014-7169.
> https://access.redhat.com/articles/1200223
>
> According to the article at redhat, only bash is vulnerable, so (if you do
> not have homegrown bashisms in shells with #!/bin/sh as first line) you
> should check that ls -l /bin/sh gives "/bin/sh -> dash", and do
> dpkg-reconfigure dash if it does not.
>
>
> --
> To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject
> of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
> Archive: https://lists.debian.org/5423c1c4.1090...@alstadheim.priv.no
>


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/cahg8tecx7n-f5n8gznsd6b7rprbbkvxwzpjjukshbmqo3pc...@mail.gmail.com

Reply via email to