Sample Header Ad - 728x90

When was the shellshock (CVE-2014-6271/7169) bug introduced, and what is the patch that fully fixes it?

124 votes
2 answers
21788 views
**Some context about the bug: [CVE-2014-6271](http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271)** > Bash supports exporting not just shell variables, but also shell functions to other bash instances, via the process environment to (indirect) child processes. Current bash versions use an environment variable named by the function name, and a function definition starting with “() {” in the variable value to propagate function definitions through the environment. The vulnerability occurs because bash does not stop after processing the function definition; it continues to parse and execute shell commands following the function definition. For example, an environment variable setting of > > VAR=() { ignored; }; /bin/id > > will execute /bin/id when the environment is imported into the bash process. Source: http://seclists.org/oss-sec/2014/q3/650 **When was the bug introduced, and what is the patch that fully fixes it?** (See [CVE-2014-7169](http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169)) What are the vulnerable versions beyond noted in the CVE (initially) (3.{0..2} and 4.{0..3})? **Has the buggy source code been reused in other projects?** Additional information is desirable. --- Related: [What does env x='() { :;}; command' bash do and why is it insecure?](https://unix.stackexchange.com/questions/157329/what-does-env-x-command-bash-do-and-why-is-it-insecure)
Asked by Deer Hunter (1886 rep)
Sep 25, 2014, 03:53 AM
Last activity: Jan 15, 2019, 02:47 PM