What is the Bash Vulnerability?
The Bash vulnerability is a major new security flaw affecting Mac, Linux, and Unix operating systems. Bash (short for Bourne Again Shell) is one of the most commonly installed utilities on any Linux system. Bash is typically run in a text window and allows a user to type commands at a command prompt. The newly discovered flaw in Bash could allow an attacker to execute code that will enable the attacker to take over the affected system and control it remotely.
The Mac OS X operating system is based on Unix and is also affected by this vulnerability.
What is Pitt doing?
Computing Services and Systems Development will be conducting a detailed inventory of enterprise systems that could be susceptible to the Bash vulnerability and working to apply the appropriate security updates. We will also work with University departments to identify and patch any susceptible departmental servers and systems.
What should I do?
If you use Mac OS X, install the update below provided by Apple:
If you use a version of the Linux operating system that has bash installed, refer to the links below to obtain instructions for applying the appropriate security update:
If you use vulnerable Oracle products, install the updates provided below:
If you use vulnerable VMware products, install the updates provided below:
If you manage a server in your department and would like assistance determining if it is susceptible, please contact the Technology Help Desk at 412-624-HELP  or submit a request online.