跳到主要内容
博客云概述'Shellshock'Bash 漏洞

'Shellshock'Bash 漏洞

在过去的一周里,GNUBash 中的几个漏洞被发现并被称为 "Shellshock"。利用这些漏洞,攻击者可以远程执行命令,从而危害机器。更糟糕的是,许多常见的配置为这种攻击提供了载体,使其成为一个严重的问题。

许多Linux发行版已经提供了补丁软件,所以你能做的最好的事情就是把你的系统更新到最新版本。我们已经发布了一份指南,帮助确定你的服务器是否有漏洞以及如何更新Bash :

针对Shellshock漏洞升级Bash

如果你有任何其他问题或担忧,请毫不犹豫地打开支持票。


评论 (5)

  1. Author Photo

    Presumably the DHCP servers at Linode that most Linodes use by default, were patched?

    Thanks

  2. Author Photo

    nm, I realise the exploit works only if a malicious DHCP server attacks a vulnerable *client*

    🙂

  3. Author Photo

    Thank you for the detailed guide on how we can protect our Linodes. As our service provider, please release a statement addressing your response to the vulnerability for the Linode infrastructure and your progress in patching.

  4. Author Photo

    If you Could you update that guide to check CVE-2014-6278 vulnerability, that would be great. One page contains information to check these chaining bugs that effecting bash

留下回复

您的电子邮件地址将不会被公布。 必须填写的字段被标记为*