Here is how you can test if you are vulnerable from the latest bash bug:
Am I vulnerable?
Edit for the time being: You are. No complete public fix has been posted yet, for the new CVE (CVE-2014-7169). The instructions I give below are only sufficient to close off part of the vulnerability.
There is an easy check. Open a terminal and paste the following:
env x='() { :;}; echo vulnerable' bash -c 'echo hello'
It simply sets the environment variable called x to the value '() { :;}; echo vulnerable'. It then invokes bash asking it to echo back the word hello. The value of x that is set is a function definition that should do nothing. However, it is crafted to try to run 'echo vulnerable' at parsing of environment at bash start-up, which just prints vulnerable to standard out.
If you are not vulnerable, then the following will be shown:
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
hello
If you are vulnerable, then you will see:
vulnerable
hello
Most likely you will be. In that case, a "yum update bash" should fix it. But I have been told that a reboot, after the update, is also be necessary...
What is the CVE-2014-6271 bash vulnerability, and how do I fix it?askubuntu.com
Recently, there have been news going around regarding "CVE-2014-6721", which is a vulnerability in Bash. How do I know if I am affected by this, how can I fix it, and why should I care? This is de...