Ultimate Solution to CentOS Bash Vulnerabilities
Software and systems that have been successfully used: All Linux operating systems that have installed GNU bash versions earlier than or equal to 4.3.
Bash vulnerability Description: This vulnerability is caused by the special environment variables created before the bash shell you call. These variables can contain code and will be executed by bash.
[Vulnerability Detection Method]
Use the Vulnerability Detection command in server commands: env-I X = '() {(a) => \ 'bash-C' echo date'; cat echo
The current system time is displayed before the fix, indicating that the server vulnerability has not been fixed. please fix it in time. The following is a Linux system fix solution, which includes the Final Solution for CentOS and Ubuntu.
I. CentOS final Bash vulnerability Fixing Solution
In the server command box, type the following command to upgrade to fix the vulnerability:
Yum clean all
Yum makecache
Yum-y update bash
Ii. Ubuntu finally fixes the Bash vulnerability. Run the following command:
Apt-cache gencaches
Apt-get-y install -- only-upgrade bash
After the above method is fixed, run the detection command again: env-I X = '() {(a) => \ 'bash-C' echo date'; cat echo
If you use the fix scheme to fix the vulnerability, output: date, that is, if the output result contains the date string, the vulnerability fix is successful.
Bash vulnerability latest patch installation tutorial [Download]
Gitlab-shell is affected by Bash CVE-2014-6271 Vulnerability
Linux security vulnerability exposure Bash is more serious than heartbleed
The solution is to upgrade Bash. Please refer to this article.
Linux Bash Security Vulnerability repair
This article permanently updates the link address: