A vulnerability in the Linux Bash shell may allow for an attacker to execute code on a server and open the door to other attacks taking place that could lead to the server becoming fully compromised. Affected distributions include: Red Hat Enterprise Linux (versions 4 – 7) Fedora CentOS (versions 5 – 7) CloudLinux Debian If you […]