On 10/16/2014 03:02 PM, Dave Kalaluhi wrote:
> We have been compiling some of the older versions of bash to fix
> vulnerabilities, and for the most, has been working.
> 
> However, when we patch the 013 patch for CVE-2014-7187, and run the
> nested loop, it's still showing as vulnerable.

Exactly HOW are you testing?

> 
> Has anyone else had a similiar experience?

Reading the archives, I see other people using an invalid test for
CVE-2014-7187:

https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00137.html
https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00140.html

Remember, a parser bug is not necessarily an exploitable vulnerability.
 It is sufficient to know that bash cannot be exploited once you apply
patch 10 (all 6 CVEs were neutralized by that one patch, as well as any
other as-yet-unreported parser bugs).


-- 
Eric Blake   eblake redhat com    +1-919-301-3266
Libvirt virtualization library http://libvirt.org

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to