The command-line shell ‘bash’ evaluates environment variables, which
allows the injection of characters and might be used to access files on
the system in some circumstances (CVE-2014-7169).
Please note that this issue is different from a previously fixed
vulnerability tracked under CVE-2014-6271 and is less serious due to the
special, non-default system configuration that is needed to create an
exploitable situation.
To remove further exploitation potential we now limit the
function-in-environment variable to variables prefixed with BASH_FUNC_.
This hardening feature is work in progress and might be improved in later
updates.
Additionally, two other security issues have been fixed:
* CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
* CVE-2014-7187: Nesting of for loops could lead to a crash of bash.
Security Issues:
* CVE-2014-7169
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169</a>>
* CVE-2014-7186
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186</a>>
* CVE-2014-7187
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187</a>>
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
SUSE Manager 1.7 for SLE | 11.2 | x86_64 | libreadline5-32bit | < 5.2-147.14.22.1 | libreadline5-32bit-5.2-147.14.22.1.x86_64.rpm |
SUSE Manager 1.7 for SLE | 11.2 | x86_64 | bash-doc | < 3.2-147.14.22.1 | bash-doc-3.2-147.14.22.1.x86_64.rpm |
SUSE Manager 1.7 for SLE | 11.2 | x86_64 | bash | < 3.2-147.14.22.1 | bash-3.2-147.14.22.1.x86_64.rpm |
SUSE Manager 1.7 for SLE | 11.2 | x86_64 | readline-doc | < 5.2-147.14.22.1 | readline-doc-5.2-147.14.22.1.x86_64.rpm |
SUSE Manager 1.7 for SLE | 11.2 | x86_64 | libreadline5 | < 5.2-147.14.22.1 | libreadline5-5.2-147.14.22.1.x86_64.rpm |