<?xml version="1.0"?>
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/ DTD/wml_1.1.xml">

<wml>
<head>
<meta http-equiv="cache-control" content="max-age=180,private" />
</head>
<card title="Linux SSH bash紧急安全补丁！重要！">
<p>
作者:<a href="index.php?action=showuser&amp;userid=1&amp;hash=">admin</a><br />时间:2014-09-29 10:28<br />分类:<a href="index.php?action=list&amp;cid=3&amp;hash=">电脑技术</a><br />内容:
Linux SSH bash紧急安全补丁！重要！

漏洞级别:非常严重

漏洞信息：Bash CVE-2014-6271

1.测试是否存在漏洞，执行以下命令：

# env t='() { :;}; echo You are vulnerable.' bash -c &quot;true&quot;
如果显示You are vulnerable，很遗憾，必须立即打上安全补丁修复

2.修复漏洞办法

centos:(最终解决方案) 
yum clean all 
yum makecache 
yum -y update bash  
 
ubuntu:(最终解决方案) 
apt-cache gencaches 
apt-get -y install --only-upgrade bash  
 
debian:(最终解决方案) 
7.5  64bit &amp;&amp; 32bit  
apt-cache gencaches 
apt-get -y install --only-upgrade bash  
 
6.0.x 64bit  
wget http://mirrors.aliyun.com/debian/pool/main/b/bash/bash_4.1-3+deb6u2_amd64.deb &amp;&amp;  dpkg -i bash_4.1-3+deb6u2_amd64.deb  
 
6.0.x 32bit  
wget http://mirrors.aliyun.com/debian/pool/main/b/bash/bash_4.1-3+deb6u2_i386.deb &amp;&amp;  dpkg -i bash_4.1-3+deb6u2_i386.deb 
 
 
aliyun linux:(最终解决方案) 
5.x 64bit  
wget http://mirrors.aliyun.com/centos/5/updates/x86_64/RPMS/bash-3.2-33.el5_10.4.x86_64.rpm &amp;&amp; rpm -Uvh bash-3.2-33.el5_10.4.x86_64.rpm  
 
5.x 32bit  
wget http://mirrors.aliyun.com/centos/5/updates/i386/RPMS/bash-3.2-33.el5_10.4.i386.rpm  &amp;&amp; rpm -Uvh bash-3.2-33.el5_10.4.i386.rpm</p><p>
<a href="index.php?action=login&amp;hash=">立即登陆发表评论</a><br />
</p>
<p><a href="index.php?action=list&amp;hash=">返回日志列表</a><br /><a href="index.php?action=index&amp;hash=">返回主页</a></p>
</card>
</wml>
