26. 09. 2014 Thomas Forrer Downloads / Release Notes, NetEye

Package bash-3.2-33.el5.1 released fixing security bug (ShellShock CVE-2014-7169)

The updated package bash-3.2-33.el5.1 is now available in our stable repository.
You can now safely update the bash executable using the following commands:

# yum clean all
# yum update bash

Thomas Forrer

Thomas Forrer

Team Leader Research & Development at Würth Phoenix
Hi folks! I began loving computer since 1994, it was still the time of windows 3.1. Immediately I learned starting DOS games from the command promt, and while typing some white text on black background I felt like some hackish dude in a hollywoodian movie. Later during the studies at the university, I discovered the magic world of opensource, and it was love at first sight. Finally I got rid of BSOD's =) I love everything that is connected to some network, especially in a security perspective. My motto is: "With motivation, nothing is impossibile. It only requires more time."

Author

Thomas Forrer

Hi folks! I began loving computer since 1994, it was still the time of windows 3.1. Immediately I learned starting DOS games from the command promt, and while typing some white text on black background I felt like some hackish dude in a hollywoodian movie. Later during the studies at the university, I discovered the magic world of opensource, and it was love at first sight. Finally I got rid of BSOD's =) I love everything that is connected to some network, especially in a security perspective. My motto is: "With motivation, nothing is impossibile. It only requires more time."

2 Replies to “Package bash-3.2-33.el5.1 released fixing security bug (ShellShock CVE-2014-7169)”

  1. nvanwyen says:

    Where can the RPM be downloaded? If the system is air-gapped, YUM does’t do much good 🙂 … can you provide a URL to download the RPM file?

    1. Hi,
      you can contact our support team if you have troubles downloading RPM’s from our update servers. They will provide you the right urls or directly the RPMs.

      Kind regards

Leave a Reply

Your email address will not be published. Required fields are marked *

Archive