Bonjour,
« NAS4Free 9.2.0.1 - Shigawire » utilise « GNU bash, version 4.3.11(2)-release (amd64-portbld-freebsd9.2) »
On peut vérifier la vulnérabilité de ce bash avec la commande :
$ env x='() { :;}; echo vulnerable' bash -c 'echo hello'
vulnerable
hello
Bash 4.3.11 a donc une faille de sécurité CVE-2014-6271 and CVE-2014-7169.
Comment le mettre à jour avec la version 4.3.25 ? voir le post :
https://forums.freebsd.org/viewtopic.php?f=5&t=48165
Bien cordialement
This is the old XigmaNAS forum in read only mode,
it will taken offline by the end of march 2021!
I like to aks Users and Admins to rewrite/take over important post from here into the new fresh main forum!
Its not possible for us to export from here and import it to the main forum!
it will taken offline by the end of march 2021!
I like to aks Users and Admins to rewrite/take over important post from here into the new fresh main forum!
Its not possible for us to export from here and import it to the main forum!
Comment recompiler Bash pour éliminer la faille CVE-2014
Moderators: velivole18, ernie, mtiburs
-
dhenin
- Starter

- Posts: 63
- Joined: 12 Apr 2013 08:47
- Location: Poissy (France)
- Status: Offline
Comment recompiler Bash pour éliminer la faille CVE-2014
---------------------------------------------------------
(V) Dhénin Jean-Jacques
( ..) 78300 Poissy
c(')(') dhenin@gmail.com
---------------------------------------------------------
(V) Dhénin Jean-Jacques
( ..) 78300 Poissy
c(')(') dhenin@gmail.com
---------------------------------------------------------