Main > Stakeholder Proposals
Linux delegates - update bash to evade shellshock vulnerability!
cryptillionaire:
Excellent response guys, if anyone hasn't looked into patching this, please do.
It might not have a massive impact on bitshare dacs, but it's better safe than sorry.
coolspeed:
--- Quote from: CoinHoarder on September 26, 2014, 09:16:50 pm ---Just in case anyone would find this useful.. it is a guide on how to tell if you are vulnerable and how to fix it.
https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability
--- End quote ---
It helped me. Thank you for your link.
coolspeed:
Fixed. Thanks for warning.
CoinHoarder:
Just in case anyone would find this useful.. it is a guide on how to tell if you are vulnerable and how to fix it.
https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability
cryptillionaire:
--- Quote from: cube on September 26, 2014, 02:37:16 am ---
--- Quote from: cryptillionaire on September 25, 2014, 06:06:40 pm ---http://arstechnica.com/security/2014/09/concern-over-bash-vulnerability-grows-as-exploit-reported-in-the-wild/
Aparantley this has a huge impact on linux/unix/osx servers with bash installed; if you've got it installed, please update it and keep ontop of this news!
--- End quote ---
Updated to patched bash.
I do not see it as much of a threat. The exploit only works if a delegate is using shared hosting or running services such as Web server which has bash escape. I doubt any delegate would do that.
--- End quote ---
Shared hosting like 2 cores out of 16 on a cloud provider? Cause I see that as quite a likely scenario.
Either way, best to be safe and patch it ;D
Navigation
[0] Message Index
[#] Next page
Go to full version