Lucene search

K
suseSuseSUSE-SU-2014:1214-1
HistorySep 25, 2014 - 1:05 a.m.

Security update for bash (critical)

2014-09-2501:05:39
lists.opensuse.org
51

EPSS

0.974

Percentile

99.9%

bash has been updated to fix a critical security issue.

In some circumstances, the shell would evaluate shellcode in environment
variables passed at startup time. This allowed code execution by local or
remote attackers who could pass environment variables to bash scripts.
(CVE-2014-6271)

Additionally, the following bugs have been fixed:

   * Avoid possible buffer overflow when expanding the /dev/fd prefix
     with e.g. the test built-in. (CVE-2012-3410)
   * Enable workaround for changed behavior of sshd. (bnc#688469)

Security Issues:

   * CVE-2014-6271
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271</a>&gt;
   * CVE-2012-3410
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410</a>&gt;