How do CentOS and Ubuntu fix Linux bash vulnerabilities?

Source: Internet
Author: User
Tags echo date centos

The recent Linux official built-in bash found a very serious security vulnerability, hackers can use this bash vulnerability to fully control the target system and launch an attack, in order to avoid your Linux server affected, we recommend that you complete the patch as soon as possible. Today Linux officials have given the latest solution to bash vulnerabilities, and no friends to fix bash vulnerabilities, please fix them ASAP. Here is a small compilation of the most commonly used Linux kernel CentOS and ubuntu server to fix bash vulnerabilities Ultimate fix method.

CentOS and Ubuntu the ultimate way to fix Linux bash vulnerabilities

  Software and systems that have been identified for successful use: All Linux operating systems that install the GNU Bash version is less than or equal to 4.3.

"Bash vulnerability description" The flaw stems from the special environment variables that you created before the bash shell you invoked, which can contain code and be executed by bash.

  "Vulnerability Detection Method"

Using vulnerability detection commands in server commands: Env-i x= ' () {(a) => ' bash-c ' echo date '; Cat Echo

Before fixing, the current system time is displayed, which indicates that the server has not been repaired, please fix it in time, the following is attached the Linux system repair program, including: CentOS and Ubuntu System final repair program.

  First, CentOS final fix Bash vulnerability scenario

In the Server command box, type the following command to upgrade to fix the vulnerability:

Yum Clean All

Yum Makecache

YUM-Y Update Bash

  Second, Ubuntu finally fixes the Bash vulnerability scenario, please run the following command

Apt-cache gencaches

Apt-get-y Install--only-upgrade Bash

After the above method is repaired, we run the detection command again: Env-i x= ' () {(a) => ' bash-c ' echo date '; Cat Echo

If the output is repaired using a patch solution: date, which means that the output contains a date string, indicates that the vulnerability fix succeeded.

Other Linux server Bash Vulnerability Ultimate Fix method

  Special Note : This fix will not have any impact, if your script uses the above way to define environment variables, after repair your script execution will complain, in order to prevent accidental occurrence, we recommend that you execute the Linux server system disk before the backup.

Note : More wonderful tutorials Please pay attention to the triple computer tutorial section, triple Computer office group: 189034526 welcome you to join

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.