SUSE Security Update: Security update for bash
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1247-1
Rating:             important
References:         #898346 #898603 #898604 
Cross-References:   CVE-2014-7169 CVE-2014-7186 CVE-2014-7187
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 11 SP2 LTSS
                    SUSE Linux Enterprise Server 11 SP1 LTSS
                    SUSE Linux Enterprise Server 10 SP4 LTSS
                    SUSE Linux Enterprise Server 10 SP3 LTSS
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:


   The command-line shell 'bash' evaluates environment variables, which
   allows the injection of characters and might be used to access files on
   the system in some circumstances (CVE-2014-7169).

   Please note that this issue is different from a previously fixed
   vulnerability tracked under CVE-2014-6271 and is less serious due to the
   special, non-default system configuration that is needed to create an
   exploitable situation.

   To remove further exploitation potential we now limit the
   function-in-environment variable to variables prefixed with BASH_FUNC_.
   This hardening feature is work in progress and might be improved in later
   updates.

   Additionally, two other security issues have been fixed:

       * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
       * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

   Security Issues:

       * CVE-2014-7169
         
       * CVE-2014-7186
         
       * CVE-2014-7187
         


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-bash-9780

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-bash-9780

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-bash-9780

   - SUSE Linux Enterprise Server 11 SP2 LTSS:

      zypper in -t patch slessp2-bash-9781

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-bash-9782

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-bash-9780

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      readline-devel-5.2-147.22.1

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):

      readline-devel-32bit-5.2-147.22.1

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      libreadline5-5.2-147.22.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      bash-3.2-147.22.1
      bash-doc-3.2-147.22.1
      libreadline5-5.2-147.22.1
      readline-doc-5.2-147.22.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

      libreadline5-32bit-5.2-147.22.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      bash-3.2-147.22.1
      bash-doc-3.2-147.22.1
      libreadline5-5.2-147.22.1
      readline-doc-5.2-147.22.1

   - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

      libreadline5-32bit-5.2-147.22.1

   - SUSE Linux Enterprise Server 11 SP3 (ia64):

      bash-x86-3.2-147.22.1
      libreadline5-x86-5.2-147.22.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):

      bash-3.2-147.14.22.1
      bash-doc-3.2-147.14.22.1
      libreadline5-5.2-147.14.22.1
      readline-doc-5.2-147.14.22.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64):

      libreadline5-32bit-5.2-147.14.22.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):

      bash-3.2-147.14.22.1
      bash-doc-3.2-147.14.22.1
      libreadline5-5.2-147.14.22.1
      readline-doc-5.2-147.14.22.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64):

      libreadline5-32bit-5.2-147.14.22.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

      bash-3.1-24.34.1
      readline-5.1-24.34.1
      readline-devel-5.1-24.34.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):

      readline-32bit-5.1-24.34.1
      readline-devel-32bit-5.1-24.34.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):

      bash-3.1-24.34.1
      readline-5.1-24.34.1
      readline-devel-5.1-24.34.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):

      readline-32bit-5.1-24.34.1
      readline-devel-32bit-5.1-24.34.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      bash-3.2-147.22.1
      bash-doc-3.2-147.22.1
      libreadline5-5.2-147.22.1
      readline-doc-5.2-147.22.1

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      libreadline5-32bit-5.2-147.22.1


References:

   https://www.suse.com/security/cve/CVE-2014-7169.html
   https://www.suse.com/security/cve/CVE-2014-7186.html
   https://www.suse.com/security/cve/CVE-2014-7187.html
   https://bugzilla.suse.com/show_bug.cgi?id=898346
   https://bugzilla.suse.com/show_bug.cgi?id=898603
   https://bugzilla.suse.com/show_bug.cgi?id=898604
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/

SuSE: 2014:1247-1: important: bash

September 28, 2014
An update that fixes three vulnerabilities is now available

Summary

The command-line shell 'bash' evaluates environment variables, which allows the injection of characters and might be used to access files on the system in some circumstances (CVE-2014-7169). Please note that this issue is different from a previously fixed vulnerability tracked under CVE-2014-6271 and is less serious due to the special, non-default system configuration that is needed to create an exploitable situation. To remove further exploitation potential we now limit the function-in-environment variable to variables prefixed with BASH_FUNC_. This hardening feature is work in progress and might be improved in later updates. Additionally, two other security issues have been fixed: * CVE-2014-7186: Nested HERE documents could lead to a crash of bash. * CVE-2014-7187: Nesting of for loops could lead to a crash of bash. Security Issues: * CVE-2014-7169 * CVE-2014-7186 * CVE-2014-7187 ...

Read the Full Advisory

References

#898346 #898603 #898604

Cross- CVE-2014-7169 CVE-2014-7186 CVE-2014-7187

Affected Products:

SUSE Linux Enterprise Software Development Kit 11 SP3

SUSE Linux Enterprise Server 11 SP3 for VMware

SUSE Linux Enterprise Server 11 SP3

SUSE Linux Enterprise Server 11 SP2 LTSS

SUSE Linux Enterprise Server 11 SP1 LTSS

SUSE Linux Enterprise Server 10 SP4 LTSS

SUSE Linux Enterprise Server 10 SP3 LTSS

SUSE Linux Enterprise Desktop 11 SP3

https://www.suse.com/security/cve/CVE-2014-7169.html

https://www.suse.com/security/cve/CVE-2014-7186.html

https://www.suse.com/security/cve/CVE-2014-7187.html

https://bugzilla.suse.com/show_bug.cgi?id=898346

https://bugzilla.suse.com/show_bug.cgi?id=898603

https://bugzilla.suse.com/show_bug.cgi?id=898604

https://scc.suse.com:443/patches/

https://scc.suse.com:443/patches/

...

Read the Full Advisory

Severity
Announcement ID: SUSE-SU-2014:1247-1
Rating: important

Related News