Описание
Security update for bash
This update for bash fixed several issues
This security issue was fixed:
- CVE-2016-9401: popd in bash might allowed local users to bypass the restricted shell and cause a use-after-free via a crafted address (bsc#1010845).
This non-security issue was fixed:
- Fix when HISTSIZE=0 and chattr +a .bash_history (bsc#1031729)
Список пакетов
SUSE Linux Enterprise Server 11 SP4
bash-3.2-147.35.1
bash-doc-3.2-147.35.1
bash-x86-3.2-147.35.1
libreadline5-5.2-147.35.1
libreadline5-32bit-5.2-147.35.1
libreadline5-x86-5.2-147.35.1
readline-doc-5.2-147.35.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
bash-3.2-147.35.1
bash-doc-3.2-147.35.1
bash-x86-3.2-147.35.1
libreadline5-5.2-147.35.1
libreadline5-32bit-5.2-147.35.1
libreadline5-x86-5.2-147.35.1
readline-doc-5.2-147.35.1
SUSE Linux Enterprise Software Development Kit 11 SP4
libreadline5-5.2-147.35.1
readline-devel-5.2-147.35.1
readline-devel-32bit-5.2-147.35.1
Ссылки
- Link for SUSE-SU-2017:1337-1
- E-Mail link for SUSE-SU-2017:1337-1
- SUSE Security Ratings
- SUSE Bug 1010845
- SUSE Bug 1031729
- SUSE Bug 976776
- SUSE CVE CVE-2016-9401 page
Описание
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:bash-3.2-147.35.1
SUSE Linux Enterprise Server 11 SP4:bash-doc-3.2-147.35.1
SUSE Linux Enterprise Server 11 SP4:bash-x86-3.2-147.35.1
SUSE Linux Enterprise Server 11 SP4:libreadline5-32bit-5.2-147.35.1
Ссылки
- CVE-2016-9401
- SUSE Bug 1010845
- SUSE Bug 1044328
- SUSE Bug 1123788
- SUSE Bug 1159416