Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:2872-1

Опубликовано: 22 нояб. 2016
Источник: suse-cvrf

Описание

Security update for bash

This update for bash fixes the following issues:

  • CVE-2016-7543: Local attackers could have executed arbitrary commands via specially crafted SHELLOPTS+PS4 variables (bsc#1001299)
  • CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when $HOSTNAME was expanded in the prompt (bsc#1000396)
  • CVE-2014-6277: More troubles with functions (bsc#898812, bsc#1001759)
  • CVE-2014-6278: Code execution after original 6271 fix (bsc#898884)

Список пакетов

SUSE Linux Enterprise Desktop 12 SP1
bash-4.2-82.1
bash-doc-4.2-82.1
bash-lang-4.2-82.1
libreadline6-6.2-82.1
libreadline6-32bit-6.2-82.1
readline-doc-6.2-82.1
SUSE Linux Enterprise Server 12 SP1
bash-4.2-82.1
bash-doc-4.2-82.1
libreadline6-6.2-82.1
libreadline6-32bit-6.2-82.1
readline-doc-6.2-82.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
bash-4.2-82.1
bash-doc-4.2-82.1
libreadline6-6.2-82.1
libreadline6-32bit-6.2-82.1
readline-doc-6.2-82.1
SUSE Linux Enterprise Software Development Kit 12 SP1
bash-devel-4.2-82.1
readline-devel-6.2-82.1
SUSE Linux Enterprise Workstation Extension 12 SP1
bash-lang-4.2-82.1

Описание

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1

Ссылки

Описание

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1

Ссылки

Описание

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1

Ссылки

Описание

Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1
SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1

Ссылки
Уязвимость SUSE-SU-2016:2872-1