Bash security update published by Redhat
				
					Collapse
				
			
		
	X
- 
	
	
	
	
 What exactly do you think it tests? You are basically running:
 
 bash -c "echo vulnerable to CVE-2014-7169"
 
 of course it will print out: vulnerable to CVE-2014-7169
 No injection here, bash just executes "echo ...." command.Leave a comment:
- 
	
	
	
	
 I have that version installed. Heres another test that should work on any nix version:
 
 Code:env var=(){(a)=> bash -c "echo vulnerable to CVE-2014-7169"; /bin/trueLeave a comment:
- 
	
	
	
	
 Seems to be the correct version though?
 Leave a comment:
- 
	
	
	
	
 For redhat based systems the test I mentioned above is here: https://access.redhat.com/articles/1200223Leave a comment:
- 
	
	
	
	
 afaik it shouldnt print out those error messages kernow.
 
 Check bottom https://access.redhat.com/articles/1212303 for the outputs when not affected.
 Perhaps theres a difference of output from redhat and debian?Leave a comment:
- 
	
	
	
	
 Until the fix comes, if you use mod_security add the rules posted here: https://access.redhat.com/articles/1212303Leave a comment:
- 
	
	
	
	
 CloudLinux pushed out the first bash update, but now there is a second update available. My non-CloudLinux boxes got the update directly from the CentOS repo... just waiting for CloudLinux to catch up.
 
 - ScottLeave a comment:
- 
	
	
	
	
 bitlab:
 try:
 
 It also seems youre using yum priorities plugin. Perhaps youre holding bash back by having higher priority for some other repo?Code:yum clean all yum update bash 
 Check priority in your /etc/yum.repos.d/ files and make sure cloudlinux.repo has the highest (lowest value) priority - that is: priority=1Leave a comment:
- 
	
	
	
	
 Hi there:
 
 I just did exactly that but got this:
 
 yum update bash
 Loaded plugins: priorities, protectbase, rhnplugin, security
 27 packages excluded due to repository priority protections
 0 packages excluded due to repository protections
 Setting up Update Process
 No Packages marked for Update
 
 Any clues?Leave a comment:
 
	
Leave a comment: