On Thu, Sep 25 at 10:58, Andy Random wrote:
>
> Since I've not seen it mentioned on the lists...
>
> See below for the full details.
>
> The idiots guide is run the command:
>
> $ env X="() { :;} ; echo busted" `which bash` -c "echo completed"
>
> If it comes back:
>
> busted
> completed
>
> You are vulnerable and need to update.
>
> I've patched my CentOS server today, I understand Debian and Ubuntu both
> have fixes, I'll try updating my LUbuntu laptop when I get home, but my
> MacBook Pro is currently still vulnerable.
Ah but have you applied the correct patch ?
There has been a followup to the initial patch which was incomplete.
Patches applied this morning may pass your test but still leave you
vulnerable.
You need fixes for CVE-2014-6271 (the original) and CVE-2014-7169.
From Red Hat[1]:
Red Hat has become aware that the patches shipped for this issue are
incomplete. An attacker can provide specially-crafted environment variables
containing arbitrary commands that will be executed on vulnerable systems
under certain conditions. The new issue has been assigned CVE-2014-7169.
For details on a workaround, see: [2]
Gentoo GLSA 201409-10 [3]
[1]
https://access.redhat.com/security/cve/CVE-2014-6271
[2]
https://access.redhat.com/articles/1200223
[3]
http://security.gentoo.org/glsa/glsa-201409-10.xml
--
Bob Dunlop
--
Please post to: Hampshire@???
Web Interface:
https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL:
http://www.hantslug.org.uk
--------------------------------------------------------------