This morning a critical vulnerability was announced in GNU Bash. This vulnerability affects versions of CentOS, Fedora, and Red Hat Enterprise Linux (RHEL).
The Vulnerability
Huzaifa Sidhpurwala has an excellent post on the Red Hat Security Blog that explains the vulnerability and potential attacks.
In a nutshell:
the vulnerability arises from the fact that you can create environment variables with specially-crafted values before calling the bash shell. These variables can contain code, which gets executed as soon as the shell is invoked. The name of these crafted variables does not matter, only their contents.
If you're wondering "does this affect me?" here's the quick way to find out, as Ryan Lerch pointed out in the Fedora Magazine post:
env x='() { :;}; echo OOPS' bash -c /bin/true
If the shell returns "OOPS" then you're vulnerable. If it returns an error, then you have an updated bash
.
Getting Updates
If you're running these operating systems, you'll want to update immediately. More information about RHEL updates is on the customer portal. CentOS has an announcement for each release, CentOS 5, CentOS 6, and CentOS 7. Fedora Magazine also has information on the vulnerabiltiy, and information on how to get the updates immediately from Koji.
关于作者
Joe Brockmeier is the editorial director of the Red Hat Blog. He also acts as Vice President of Marketing & Publicity for the Apache Software Foundation.
Brockmeier joined Red Hat in 2013 as part of the Open Source and Standards (OSAS) group, now the Open Source Program Office (OSPO). Prior to Red Hat, Brockmeier worked for Citrix on the Apache OpenStack project, and was the first OpenSUSE community manager for Novell between 2008-2010.
He also has an extensive history in the tech press and publishing, having been editor-in-chief of Linux Magazine, editorial director of Linux.com, and a contributor to LWN.net, ZDNet, UnixReview.com, and many others.
产品
工具
试用购买与出售
沟通
关于红帽
我们是世界领先的企业开源解决方案供应商,提供包括 Linux、云、容器和 Kubernetes。我们致力于提供经过安全强化的解决方案,从核心数据中心到网络边缘,让企业能够更轻松地跨平台和环境运营。