sudo apt-get clean && sudo apt-get update && sudo apt-get upgrade && sudo apt-get autoremove
Robbie Wright Siuslaw Broadband <http://siuslawbroadband.com> 541-902-5101 On Thu, Sep 25, 2014 at 12:42 PM, Ty Featherling via Af <[email protected]> wrote: > Noob question but how can I easiest update my linux boxes to get the > latest patches? > > -Ty > > On Thu, Sep 25, 2014 at 1:59 PM, Josh Reynolds via Af <[email protected]> > wrote: > >> Upgraded our systems at 6am yesterday for this. Also pulled the bash >> .deb out of debian-stable/security for our ubiquiti edgerouters. (I made >> on a post on the UBNT forum with the CVE info yesterday.) >> >> Side note: TONS of things are affected by this... >> >> Josh Reynolds, Chief Information Officer >> SPITwSPOTS, www.spitwspots.com >> On 09/25/2014 10:25 AM, Peter Kranz via Af wrote: >> >> PS.. This vulnerability can be exploited via HTTP/Apache attack vectors, so >> you need to patch any vulnerable system running Apache. >> >> Peter Kranz >> Founder/CEO - Unwired Ltdwww.UnwiredLtd.com >> Desk: 510-868-1614 x100 >> Mobile: [email protected] >> >> -----Original Message----- >> From: Af [mailto:[email protected] >> <[email protected]>] On Behalf Of Matt via Af >> Sent: Thursday, September 25, 2014 10:27 AM >> To: [email protected] >> Subject: [AFMUG] Bash specially-crafted environment variables code injection >> attack >> >> Bash specially-crafted environment variables code injection attack >> https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/ >> >> >> >
