Gentoo Archives: gentoo-commits

From: "Tobias Heinlein (keytoaster)" <keytoaster@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201409-10.xml
Date: Thu, 25 Sep 2014 13:39:48
Message-Id: 20140925133943.8AFDE63C0@oystercatcher.gentoo.org
1 keytoaster 14/09/25 13:39:43
2
3 Added: glsa-201409-10.xml
4 Log:
5 GLSA 201409-10
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201409-10.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201409-10.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201409-10.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201409-10.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201409-10">
20 <title>Bash: Code Injection (Updated fix for GLSA 201409-09)</title>
21 <synopsis>A parsing flaw related to functions and environments in Bash could
22 allow attackers to inject code. The unaffected packages listed in GLSA
23 201409-09 had an incomplete fix.
24 </synopsis>
25 <product type="ebuild">bash</product>
26 <announced>September 25, 2014</announced>
27 <revised>September 25, 2014: 1</revised>
28 <bug>523592</bug>
29 <access>local, remote</access>
30 <affected>
31 <package name="app-shells/bash" auto="yes" arch="*">
32 <unaffected range="rge">3.1_p18-r1</unaffected>
33 <unaffected range="rge">3.2_p52-r1</unaffected>
34 <unaffected range="rge">4.0_p39-r1</unaffected>
35 <unaffected range="rge">4.1_p12-r1</unaffected>
36 <unaffected range="ge">4.2_p48-r1</unaffected>
37 <vulnerable range="lt">4.2_p48-r1</vulnerable>
38 </package>
39 </affected>
40 <background>
41 <p>Bash is the standard GNU Bourne Again SHell.</p>
42 </background>
43 <description>
44 <p>Stephane Chazelas reported that Bash incorrectly handles function
45 definitions, allowing attackers to inject arbitrary code (CVE-2014-6271).
46 Gentoo Linux informed about this issue in GLSA 201409-09.
47 </p>
48
49 <p>Tavis Ormandy reported that the patch for CVE-2014-6271 was incomplete.
50 As such, this GLSA supersedes GLSA 201409-09.
51 </p>
52 </description>
53 <impact type="high">
54 <p>A remote attacker could exploit this vulnerability to execute arbitrary
55 commands even in restricted environments.
56 </p>
57 </impact>
58 <workaround>
59 <p>There is no known workaround at this time.</p>
60 </workaround>
61 <resolution>
62 <p>All Bash 3.1 users should upgrade to the latest version:</p>
63
64 <code>
65 # emerge --sync
66 # emerge --ask --oneshot --verbose "&gt;=app-shells/bash-3.1_p18-r1"
67 </code>
68
69 <p>All Bash 3.2 users should upgrade to the latest version:</p>
70
71 <code>
72 # emerge --sync
73 # emerge --ask --oneshot --verbose "&gt;=app-shells/bash-3.2_p52-r1"
74 </code>
75
76 <p>All Bash 4.0 users should upgrade to the latest version:</p>
77
78 <code>
79 # emerge --sync
80 # emerge --ask --oneshot --verbose "&gt;=app-shells/bash-4.0_p39-r1"
81 </code>
82
83 <p>All Bash 4.1 users should upgrade to the latest version:</p>
84
85 <code>
86 # emerge --sync
87 # emerge --ask --oneshot --verbose "&gt;=app-shells/bash-4.1_p12-r1"
88 </code>
89
90 <p>All Bash 4.2 users should upgrade to the latest version:</p>
91
92 <code>
93 # emerge --sync
94 # emerge --ask --oneshot --verbose "&gt;=app-shells/bash-4.2_p48-r1"
95 </code>
96
97 </resolution>
98 <references>
99 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7169">CVE-2014-7169</uri>
100 </references>
101 <metadata tag="requester" timestamp="Thu, 25 Sep 2014 12:49:54 +0000">
102 keytoaster
103 </metadata>
104 <metadata tag="submitter" timestamp="Thu, 25 Sep 2014 13:36:56 +0000">
105 keytoaster
106 </metadata>
107 </glsa>