Lucene search

K
suseSuseSUSE-SU-2014:1247-2
HistorySep 29, 2014 - 9:04 p.m.

Security update for bash (important)

2014-09-2921:04:16
lists.opensuse.org
44

0.976 High

EPSS

Percentile

100.0%

The command-line shell ‘bash’ evaluates environment variables, which
allows the injection of characters and might be used to access files on
the system in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed
vulnerability tracked under CVE-2014-6271 and is less serious due to the
special, non-default system configuration that is needed to create an
exploitable situation.

To remove further exploitation potential we now limit the
function-in-environment variable to variables prefixed with BASH_FUNC_.
This hardening feature is work in progress and might be improved in later
updates.

Additionally, two other security issues have been fixed:

   * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
   * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

   * CVE-2014-7169
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169</a>&gt;
   * CVE-2014-7186
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186</a>&gt;
   * CVE-2014-7187
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187</a>&gt;