rub*_*o77 4 bash vulnerability
我升级了旧的Debian 6.0 (Squeeze) 服务器,但漏洞似乎仍然存在:
$ env x='() { :;}; echo vulnerable' bash -c 'echo hello'
vulnerable
hello
Run Code Online (Sandbox Code Playgroud)
如何在 Debian 6.0 (Squeeze) 上将 Bash 升级到较新版本?
要获取旧版本的更新,您可能需要将 Debian 6.0 (Squeeze) LTS 存储库添加到sources.list
.
要添加此存储库,请编辑/etc/apt/sources.list
以下行并将其添加到文件末尾。
deb http://ftp.us.debian.org/debian squeeze-lts main non-free contrib
Run Code Online (Sandbox Code Playgroud)
然后运行:
apt-get update
Run Code Online (Sandbox Code Playgroud)
随着更新的运行,您现在应该会在存储库列表中看到一些新源。现在只是:
apt-get install --only-upgrade bash
Run Code Online (Sandbox Code Playgroud)
这是sources.list
我刚刚升级的 Squeeze 服务器中的文件列表:
deb http://ftp.us.debian.org/debian/ squeeze main
deb-src http://ftp.us.debian.org/debian/ squeeze main
deb http://security.debian.org/ squeeze/updates main
deb-src http://security.debian.org/ squeeze/updates main
# squeeze-updates, previously known as 'volatile'
deb http://ftp.us.debian.org/debian/ squeeze-updates main
deb-src http://ftp.us.debian.org/debian/ squeeze-updates main
# Other - Adding the lsb source for security updates
deb http://http.debian.net/debian/ squeeze-lts main contrib non-free
deb-src http://http.debian.net/debian/ squeeze-lts main contrib non-free
Run Code Online (Sandbox Code Playgroud)