<div dir="ltr"><a href="http://www.ubuntu.com/usn/usn-2362-1/ ">Ubuntu</a> and <a href="https://lists.debian.org/debian-security-announce/2014/msg00220.html">Debian</a> were patched as well.</div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Sep 24, 2014 at 2:44 PM, Kevin McCarthy <span dir="ltr"><<a href="mailto:signals42@gmail.com" target="_blank">signals42@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><div>Figured I'd pass this along to the mailing list since it looks quite serious:<br><br><a href="http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html" target="_blank">http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html</a><br><br></div>Almost every Linux install is vulnerable to a potentially-remote execution exploit involving bash. I know it has been patched in Gentoo and RHEL. It's probably been fixed in most other distros by now, too. Time to patch!<span class="HOEnZb"><font color="#888888"><br><br></font></span></div><span class="HOEnZb"><font color="#888888">-Kevin<br><br></font></span></div>
<br>_______________________________________________<br>
grlug mailing list<br>
<a href="mailto:grlug@grlug.org">grlug@grlug.org</a><br>
<a href="http://shinobu.grlug.org/cgi-bin/mailman/listinfo/grlug" target="_blank">http://shinobu.grlug.org/cgi-bin/mailman/listinfo/grlug</a><br></blockquote></div><br></div>