[174662] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: update

daemon@ATHENA.MIT.EDU (Brandon Whaley)
Wed Sep 24 18:18:03 2014

X-Original-To: nanog@nanog.org
In-Reply-To: <CAGfsgR1rkC_mdAQYsbNusegcbAm-zakvxohoqbQw5e_d0TOoUw@mail.gmail.com>
Date: Wed, 24 Sep 2014 18:17:55 -0400
From: Brandon Whaley <redkrieg@gmail.com>
To: Jim Popovitch <jimpop@gmail.com>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

The scope of the issue isn't limited to SSH, that's just a popular
example people are using.  Any program calling bash could potentially
be vulnerable.

On Wed, Sep 24, 2014 at 6:11 PM, Jim Popovitch <jimpop@gmail.com> wrote:
>> debian/ubuntu admins may want to apt-get update/upgrade or whatever
>
> debian/ubuntu aren't really all that immediately impacted.
>
> $ grep "bash$" /etc/passwd | wc -l
> 2
>
>  ^^ both of those are user accounts, not system/daemon accounts.
>
> -Jim P.

home help back first fref pref prev next nref lref last post