[174662] in North American Network Operators' Group
Re: update
daemon@ATHENA.MIT.EDU (Brandon Whaley)
Wed Sep 24 18:18:03 2014
X-Original-To: nanog@nanog.org
In-Reply-To: <CAGfsgR1rkC_mdAQYsbNusegcbAm-zakvxohoqbQw5e_d0TOoUw@mail.gmail.com>
Date: Wed, 24 Sep 2014 18:17:55 -0400
From: Brandon Whaley <redkrieg@gmail.com>
To: Jim Popovitch <jimpop@gmail.com>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
The scope of the issue isn't limited to SSH, that's just a popular
example people are using. Any program calling bash could potentially
be vulnerable.
On Wed, Sep 24, 2014 at 6:11 PM, Jim Popovitch <jimpop@gmail.com> wrote:
>> debian/ubuntu admins may want to apt-get update/upgrade or whatever
>
> debian/ubuntu aren't really all that immediately impacted.
>
> $ grep "bash$" /etc/passwd | wc -l
> 2
>
> ^^ both of those are user accounts, not system/daemon accounts.
>
> -Jim P.