drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Umgebungsvariablen in bash
Name: |
Mangelnde Prüfung von Umgebungsvariablen in bash |
|
ID: |
SUSE-SU-2014:1223-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Manager 1.7 for SLE 11 SP2 |
|
Datum: |
Sa, 27. September 2014, 10:59 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 |
|
Applikationen: |
GNU Bash |
|
Originalnachricht |
SUSE Security Update: Security update for bash ______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1223-1 Rating: critical References: #896776 Cross-References: CVE-2014-6271 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 ______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
bash has been updated to fix a critical security issue.
In some circumstances, the shell would evaluate shellcode in environment variables passed at startup time. This allowed code execution by local or remote attackers who could pass environment variables to bash scripts. (CVE-2014-6271)
Security Issues:
* CVE-2014-6271 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>
Patch Instructions:
To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- SUSE Manager 1.7 for SLE 11 SP2:
zypper in -t patch sleman17sp2-bash-9764
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Manager 1.7 for SLE 11 SP2 (x86_64):
bash-3.2-147.14.20.1 bash-doc-3.2-147.14.20.1 libreadline5-32bit-5.2-147.14.20.1 libreadline5-5.2-147.14.20.1 readline-doc-5.2-147.14.20.1
References:
http://support.novell.com/security/cve/CVE-2014-6271.html https://bugzilla.suse.com/896776 ?keywords=634668818756ed213c0d0c593816875e
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|