Skip to main content
ExLibris

Knowledge Assistant

BETA
 
  • Subscribe by RSS
  • Back
    Aleph

     

    Ex Libris Knowledge Center
    1. Search site
      Go back to previous article
      1. Sign in
        • Sign in
        • Forgot password
    1. Home
    2. Aleph
    3. Knowledge Articles
    4. CVE-2014-6271 (shellshock bash bug) and /exlibris/product/util/bash

    CVE-2014-6271 (shellshock bash bug) and /exlibris/product/util/bash

    1. Last updated
    2. Save as PDF
    3. Share
      1. Share
      2. Tweet
      3. Share
    1. Additional Information
    • Article Type: General
    • Product: Aleph

    Problem Symptoms:
    After following "Security Update Customer Announcement-Bash flaw - final.pdf" and applying the patch supplied by Solaris:

    * The bash copy used by aleph login (to be checked with 'which bash') under /exlibris/product/util/bash (or /exlibris/product/bin/bash in other installations) is still unpatched

    Cause:
    Some installations under Solaris use /exlibris/product/util/bash

    Resolution:
    As aleph user run:

    find /exlibris/product -name bash -exec rm -f {} ;
    rm $aleph_dev/product/bin/bash

    Additional Information

    /exlibris/product/util/bash (or /exlibris/product/bin/bash) is not required by Aleph, ARC or any other Ex Libris product.

    Removing the link will cause any process using bash in the Aleph/ARC or other ExLibris product to use /bin/bash which is updated by the OS security patch.

    For general information regarding this bash bug see article "CVE-2014-6271: shellshock bash bug".


    • Article last edited: 10/1/2014
    View article in the Exlibris Knowledge Center
    1. Back to top
      • CVE-2014-3719: SQL Injection Vulnerability in Aleph
      • CVE-2015-0235 - "Ghost" vulnerability in the glibc library?
    • Was this article helpful?

    Recommended articles

    1. Article type
      Topic
      Language
      English
      Product
      Aleph
    2. Tags
      1. contype:kba
      2. Prod:Aleph
      3. Type:General
    1. © Copyright 2025 Ex Libris Knowledge Center
    2. Powered by CXone Expert ®
    • Term of Use
    • Privacy Policy
    • Contact Us
    2025 Ex Libris. All rights reserved