Bug 36005 - bash: Missing sanitising (2.4)
bash: Missing sanitising (2.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 2.4
Other Linux
: P3 normal (vote)
: UCS 2.4-sec10
Assigned To: Janek Walkenhorst
Erik Damrose
:
Depends on:
Blocks: 36240
  Show dependency treegraph
 
Reported: 2014-09-26 10:32 CEST by Stefan Gohmann
Modified: 2014-10-21 08:00 CEST (History)
4 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Gohmann univentionstaff 2014-09-26 10:32:18 CEST
Please make a backport for UCS 2.4.

+++ This bug was initially created as a clone of Bug #35992 +++

CVE-2014-6271

Stephane Chazelas discovered a vulnerability in bash, the GNU
Bourne-Again Shell, related to how environment variables are
processed.  In many common configurations, this vulnerability is
exploitable over the network, especially if bash has been configured
as the system shell.

Additional writeup: 
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Comment 1 Janek Walkenhorst univentionstaff 2014-09-26 17:19:54 CEST
Patches for CVE-2014-6271 and CVE-2014-7169 added.
Tests (i386, amd64): OK
Comment 2 Erik Damrose univentionstaff 2014-09-26 18:08:26 CEST
OK -  amd64/i386

-> env x='() { :;}; echo vulnerable' bash -c 'echo hello'
hello


OK - reboot/boot still works
Comment 3 Janek Walkenhorst univentionstaff 2014-09-26 20:23:41 CEST
Hotfix announced