SUSE Security Update: Security update for bash
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1213-1
Rating:             critical
References:         #896776 
Cross-References:   CVE-2014-0475
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 11 SP2 LTSS
                    SUSE Linux Enterprise Server 10 SP4 LTSS
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:


   bash has been updated to fix a critical security issue.

   In some circumstances, the shell would evaluate shellcode in environment
   variables passed at startup time. This allowed code execution by local or
   remote attackers who could pass environment variables to bash scripts.
   (CVE-2014-6271)

   Security Issues:

       * CVE-2014-6271
         


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-bash-9740

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-bash-9740

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-bash-9740

   - SUSE Linux Enterprise Server 11 SP2 LTSS:

      zypper in -t patch slessp2-bash-9736

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-bash-9740

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      readline-devel-5.2-147.20.1

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):

      readline-devel-32bit-5.2-147.20.1

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      libreadline5-5.2-147.20.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      bash-3.2-147.20.1
      bash-doc-3.2-147.20.1
      libreadline5-5.2-147.20.1
      readline-doc-5.2-147.20.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

      libreadline5-32bit-5.2-147.20.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      bash-3.2-147.20.1
      bash-doc-3.2-147.20.1
      libreadline5-5.2-147.20.1
      readline-doc-5.2-147.20.1

   - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

      libreadline5-32bit-5.2-147.20.1

   - SUSE Linux Enterprise Server 11 SP3 (ia64):

      bash-x86-3.2-147.20.1
      libreadline5-x86-5.2-147.20.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):

      bash-3.2-147.14.20.1
      bash-doc-3.2-147.14.20.1
      libreadline5-5.2-147.14.20.1
      readline-doc-5.2-147.14.20.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64):

      libreadline5-32bit-5.2-147.14.20.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

      bash-3.1-24.32.1
      readline-5.1-24.32.1
      readline-devel-5.1-24.32.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):

      readline-32bit-5.1-24.32.1
      readline-devel-32bit-5.1-24.32.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      bash-3.2-147.20.1
      bash-doc-3.2-147.20.1
      libreadline5-5.2-147.20.1
      readline-doc-5.2-147.20.1

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      libreadline5-32bit-5.2-147.20.1


References:

   https://www.suse.com/security/cve/CVE-2014-0475.html
   https://bugzilla.suse.com/896776
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/

SuSE: 2014:1213-1: critical: bash

September 25, 2014
An update that fixes one vulnerability is now available

Summary

bash has been updated to fix a critical security issue. In some circumstances, the shell would evaluate shellcode in environment variables passed at startup time. This allowed code execution by local or remote attackers who could pass environment variables to bash scripts. (CVE-2014-6271) Security Issues: * CVE-2014-6271 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-bash-9740 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-bash-9740 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-bash-9740 - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-bash-9736 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-bash-9740 To brin...

Read the Full Advisory

References

#896776

Cross- CVE-2014-0475

Affected Products:

SUSE Linux Enterprise Software Development Kit 11 SP3

SUSE Linux Enterprise Server 11 SP3 for VMware

SUSE Linux Enterprise Server 11 SP3

SUSE Linux Enterprise Server 11 SP2 LTSS

SUSE Linux Enterprise Server 10 SP4 LTSS

SUSE Linux Enterprise Desktop 11 SP3

https://www.suse.com/security/cve/CVE-2014-0475.html

https://bugzilla.suse.com/896776

https://scc.suse.com:443/patches/

https://scc.suse.com:443/patches/

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2014:1213-1
Rating: critical

Related News