New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
@ATHK thank you very much my friend
Info Links:
https://rhn.redhat.com/errata/RHSA-2014-1306.html
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762760#56
Ongoing Discussion via WHT:
http://www.webhostingtalk.com/showthread.php?t=1414839
Thanks @GreenHostBox, Updated two boxes so far and the command no longer works.
So is this right, or isn't it:
@cassa looks fine to me
Vulnerable bash's return this
There's another bash released for Debian/Ubuntu,
apt-get update && apt-get upgrade
again....@cassa Got the same
Am I safe now?
yep
Does anyone have instructions for how to compile from source? I have an Ubuntu 10.04 system that is still vulnerable and for which there currently are no updates.
Thanks
There IS an update for ubuntu 10.04. Try updating again? Or maybe try another mirror?
It should be making its rounds to the mirrors, but if you need to apply the update manually, deb available:
https://launchpad.net/ubuntu/lucid/i386/bash/4.1-2ubuntu3.2
https://launchpad.net/ubuntu/lucid/amd64/bash/4.1-2ubuntu3.2
Yep, you are right. I'm updated now.
I get this :
Am I safe ?
@Saahib: need update, it should show output like in Rami's post above if patched.
You can find some instrusctions for compiling for source here - https://shellshocker.net
Also it has a few other goodies.
Just want to mention aptitude update && aptitude upgrade should fix for us who prefer / use as an alternative to apt-get.
@natestamm I guess the patch is still incomplete
Are you up-to-date? ->