Bug 36003 - bash: Missing sanitising (3.1)
bash: Missing sanitising (3.1)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.1
Other Linux
: P3 normal (vote)
: UCS 3.1-1-errata
Assigned To: Janek Walkenhorst
Felix Botner
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-09-26 10:29 CEST by Stefan Gohmann
Modified: 2014-12-11 08:08 CET (History)
4 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Gohmann univentionstaff 2014-09-26 10:29:54 CEST
Please make a backport for UCS 3.1.

+++ This bug was initially created as a clone of Bug #35992 +++

CVE-2014-6271

Stephane Chazelas discovered a vulnerability in bash, the GNU
Bourne-Again Shell, related to how environment variables are
processed.  In many common configurations, this vulnerability is
exploitable over the network, especially if bash has been configured
as the system shell.

Additional writeup: 
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Comment 1 Janek Walkenhorst univentionstaff 2014-09-26 11:58:05 CEST
Additionally there are two out-of-bounds array accesses in the bash parser, which were revealed in Red Hat's internal analysis for these issues and also independently reported by Todd Sabin:

CVE-2014-7186
Parser can allow out-of-bounds memory access while handling redir_stack.

CVE-2014-7187
Off-by-one error in deeply nested flow control constructs.
Comment 2 Janek Walkenhorst univentionstaff 2014-09-26 14:27:28 CEST
squeeze-lts version (4.1-3+deb6u2) built.
Tests (amd64, i386): OK
Advisory: 2014-09-24-bash.yaml
Comment 3 Felix Botner univentionstaff 2014-09-26 14:41:00 CEST
OK - amd64/i386

-> env x='() { :;}; echo vulnerable' bash -c 'echo hello'
hello

OK - reboot/boot still works

OK - YAML
Comment 4 Janek Walkenhorst univentionstaff 2014-09-26 17:56:37 CEST
http://errata.univention.de/ucs/3.1/233.html
Comment 5 Moritz Muehlenhoff univentionstaff 2014-12-11 08:08:11 CET
This update also fixed CVE-2014-6277 and CVE-2014-6278