Security update for bash (important)

2014-09-28T19:05:16
ID SUSE-SU-2014:1247-1
Type suse
Reporter Suse
Modified 2014-09-28T19:05:16

Description

The command-line shell 'bash' evaluates environment variables, which allows the injection of characters and might be used to access files on the system in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed vulnerability tracked under CVE-2014-6271 and is less serious due to the special, non-default system configuration that is needed to create an exploitable situation.

To remove further exploitation potential we now limit the function-in-environment variable to variables prefixed with BASH_FUNC_. This hardening feature is work in progress and might be improved in later updates.

Additionally, two other security issues have been fixed:

   * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
   * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

   * CVE-2014-7169
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169</a>>
   * CVE-2014-7186
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186</a>>
   * CVE-2014-7187
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187</a>>