Main > Stakeholder Proposals

Linux delegates - update bash to evade shellshock vulnerability!

(1/2) > >>

cryptillionaire:
Excellent response guys, if anyone hasn't looked into patching this, please do.
It might not have a massive impact on bitshare dacs, but it's better safe than sorry.

coolspeed:

--- Quote from: CoinHoarder on September 26, 2014, 09:16:50 pm ---Just in case anyone would find this useful.. it is a guide on how to tell if you are vulnerable and how to fix it.

https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability

--- End quote ---

It helped me. Thank you for your link.

coolspeed:
Fixed. Thanks for warning.

CoinHoarder:
Just in case anyone would find this useful.. it is a guide on how to tell if you are vulnerable and how to fix it.

https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability

cryptillionaire:

--- Quote from: cube on September 26, 2014, 02:37:16 am ---
--- Quote from: cryptillionaire on September 25, 2014, 06:06:40 pm ---http://arstechnica.com/security/2014/09/concern-over-bash-vulnerability-grows-as-exploit-reported-in-the-wild/
Aparantley this has a huge impact on linux/unix/osx servers with bash installed; if you've got it installed, please update it and keep ontop of this news!

--- End quote ---

Updated to patched bash.

I do not see it as much of a threat. The exploit only works if a delegate is using shared hosting or running services such as Web server which has bash escape.  I doubt any delegate would do that.

--- End quote ---
Shared hosting like 2 cores out of 16 on a cloud provider? Cause I see that as quite a likely scenario.
Either way, best to be safe and patch it ;D

Navigation

[0] Message Index

[#] Next page

Go to full version