Debian 6.0 (Squeeze) 上的 Bash 漏洞 CVE-2014-6271 (Shellshock) 修复

rub*_*o77 4 bash vulnerability

我升级了旧的Debian 6.0 (Squeeze) 服务器,但漏洞似乎仍然存在:

$ env x='() { :;}; echo vulnerable' bash -c 'echo hello'
vulnerable
hello
Run Code Online (Sandbox Code Playgroud)

如何在 Debian 6.0 (Squeeze) 上将 Bash 升级到较新版本?

111*_*--- 6

要获取旧版本的更新,您可能需要将 Debian 6.0 (Squeeze) LTS 存储库添加到sources.list.

要添加此存储库,请编辑/etc/apt/sources.list以下行并将其添加到文件末尾。

deb http://ftp.us.debian.org/debian squeeze-lts main non-free contrib
Run Code Online (Sandbox Code Playgroud)

然后运行:

apt-get update
Run Code Online (Sandbox Code Playgroud)

随着更新的运行,您现在应该会在存储库列表中看到一些新源。现在只是:

apt-get install --only-upgrade bash
Run Code Online (Sandbox Code Playgroud)

这是sources.list我刚刚升级的 Squeeze 服务器中的文件列表:

deb http://ftp.us.debian.org/debian/ squeeze main
deb-src http://ftp.us.debian.org/debian/ squeeze main

deb http://security.debian.org/ squeeze/updates main
deb-src http://security.debian.org/ squeeze/updates main

# squeeze-updates, previously known as 'volatile'
deb http://ftp.us.debian.org/debian/ squeeze-updates main
deb-src http://ftp.us.debian.org/debian/ squeeze-updates main

# Other - Adding the lsb source for security updates
deb http://http.debian.net/debian/ squeeze-lts main contrib non-free
deb-src http://http.debian.net/debian/ squeeze-lts main contrib non-free
Run Code Online (Sandbox Code Playgroud)

  • 不。这是我一直在运行以检查两者的测试脚本:https://gist.github.com/KalenAnson/231db4b468fc53a5ae7d (2认同)