Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

classic Classic list List threaded Threaded
8 messages Options
Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Bugzilla from wvvelzen@gmail.com
 What about releasing this patch for the NON LTSS versions as well?
 Considering the severity of this bug...!

On Sun, Sep 28, 2014 at 7:05 PM,  <[hidden email]> wrote:

>    SUSE Security Update: Security update for bash
> ______________________________________________________________________________
>
> Announcement ID:    SUSE-SU-2014:1247-1
> Rating:             important
> References:         #898346 #898603 #898604
> Cross-References:   CVE-2014-7169 CVE-2014-7186 CVE-2014-7187
>
> Affected Products:
>                     SUSE Linux Enterprise Software Development Kit 11 SP3
>                     SUSE Linux Enterprise Server 11 SP3 for VMware
>                     SUSE Linux Enterprise Server 11 SP3
>                     SUSE Linux Enterprise Server 11 SP2 LTSS
>                     SUSE Linux Enterprise Server 11 SP1 LTSS
>                     SUSE Linux Enterprise Server 10 SP4 LTSS
>                     SUSE Linux Enterprise Server 10 SP3 LTSS
>                     SUSE Linux Enterprise Desktop 11 SP3
> ______________________________________________________________________________
>
>    An update that fixes three vulnerabilities is now available.
>
> Description:
>
>
>    The command-line shell 'bash' evaluates environment variables, which
>    allows the injection of characters and might be used to access files on
>    the system in some circumstances (CVE-2014-7169).
>
>    Please note that this issue is different from a previously fixed
>    vulnerability tracked under CVE-2014-6271 and is less serious due to the
>    special, non-default system configuration that is needed to create an
>    exploitable situation.
>
>    To remove further exploitation potential we now limit the
>    function-in-environment variable to variables prefixed with BASH_FUNC_.
>    This hardening feature is work in progress and might be improved in later
>    updates.
>
>    Additionally, two other security issues have been fixed:
>
>        * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
>        * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.
>
>    Security Issues:
>
>        * CVE-2014-7169
>          <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169>
>        * CVE-2014-7186
>          <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186>
>        * CVE-2014-7187
>          <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187>
>
>
> Patch Instructions:
>
>    To install this SUSE Security Update use YaST online_update.
>    Alternatively you can run the command listed for your product:
>
>    - SUSE Linux Enterprise Software Development Kit 11 SP3:
>
>       zypper in -t patch sdksp3-bash-9780
>
>    - SUSE Linux Enterprise Server 11 SP3 for VMware:
>
>       zypper in -t patch slessp3-bash-9780
>
>    - SUSE Linux Enterprise Server 11 SP3:
>
>       zypper in -t patch slessp3-bash-9780
>
>    - SUSE Linux Enterprise Server 11 SP2 LTSS:
>
>       zypper in -t patch slessp2-bash-9781
>
>    - SUSE Linux Enterprise Server 11 SP1 LTSS:
>
>       zypper in -t patch slessp1-bash-9782
>
>    - SUSE Linux Enterprise Desktop 11 SP3:
>
>       zypper in -t patch sledsp3-bash-9780
>
>    To bring your system up-to-date, use "zypper patch".
>
>
> Package List:
>
>    - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
>
>       readline-devel-5.2-147.22.1
>
>    - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):
>
>       readline-devel-32bit-5.2-147.22.1
>
>    - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
>
>       libreadline5-5.2-147.22.1
>
>    - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
>
>       bash-3.2-147.22.1
>       bash-doc-3.2-147.22.1
>       libreadline5-5.2-147.22.1
>       readline-doc-5.2-147.22.1
>
>    - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
>
>       libreadline5-32bit-5.2-147.22.1
>
>    - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
>
>       bash-3.2-147.22.1
>       bash-doc-3.2-147.22.1
>       libreadline5-5.2-147.22.1
>       readline-doc-5.2-147.22.1
>
>    - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
>
>       libreadline5-32bit-5.2-147.22.1
>
>    - SUSE Linux Enterprise Server 11 SP3 (ia64):
>
>       bash-x86-3.2-147.22.1
>       libreadline5-x86-5.2-147.22.1
>
>    - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):
>
>       bash-3.2-147.14.22.1
>       bash-doc-3.2-147.14.22.1
>       libreadline5-5.2-147.14.22.1
>       readline-doc-5.2-147.14.22.1
>
>    - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64):
>
>       libreadline5-32bit-5.2-147.14.22.1
>
>    - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):
>
>       bash-3.2-147.14.22.1
>       bash-doc-3.2-147.14.22.1
>       libreadline5-5.2-147.14.22.1
>       readline-doc-5.2-147.14.22.1
>
>    - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64):
>
>       libreadline5-32bit-5.2-147.14.22.1
>
>    - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
>
>       bash-3.1-24.34.1
>       readline-5.1-24.34.1
>       readline-devel-5.1-24.34.1
>
>    - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
>
>       readline-32bit-5.1-24.34.1
>       readline-devel-32bit-5.1-24.34.1
>
>    - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
>
>       bash-3.1-24.34.1
>       readline-5.1-24.34.1
>       readline-devel-5.1-24.34.1
>
>    - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
>
>       readline-32bit-5.1-24.34.1
>       readline-devel-32bit-5.1-24.34.1
>
>    - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
>
>       bash-3.2-147.22.1
>       bash-doc-3.2-147.22.1
>       libreadline5-5.2-147.22.1
>       readline-doc-5.2-147.22.1
>
>    - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
>
>       libreadline5-32bit-5.2-147.22.1
>
>
> References:
>
>    http://support.novell.com/security/cve/CVE-2014-7169.html
>    http://support.novell.com/security/cve/CVE-2014-7186.html
>    http://support.novell.com/security/cve/CVE-2014-7187.html
>    https://bugzilla.suse.com/show_bug.cgi?id=898346
>    https://bugzilla.suse.com/show_bug.cgi?id=898603
>    https://bugzilla.suse.com/show_bug.cgi?id=898604
>    http://download.suse.com/patch/finder/?keywords=01d7685e480d31be1641e84591918b9e
>    http://download.suse.com/patch/finder/?keywords=1143502d673561f6e5895393ba93df6f
>    http://download.suse.com/patch/finder/?keywords=7c3a2e9a2aa61a2702de17e1ed7a7f43
>    http://download.suse.com/patch/finder/?keywords=b6868a6fc575e34338a7d5fd7491f09f
>    http://download.suse.com/patch/finder/?keywords=d6f3fbe6b7cd7f9bd580be31dd2ada90
>
> --
> To unsubscribe, e-mail: [hidden email]
> For additional commands, e-mail: [hidden email]
>



--
Met vriendelijke groet / Best regards,
Wilfred van Velzen
--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Marcus Meissner
Hi,

Let me refer you to:
        https://www.suse.com/support/shellshock/

"What if I'm a current customer but I'm using older operating systems
 for some of my servers without a support contract like Long Term Service
 Pack Support for those older versions? Can I still get the patches?
 
 Yes. Our primary concern and first priority is to make sure that your
 systems are secure.

 Given the widespread use of Bash and its inclusion in multiple
 generations of our operating system products, we consider this to be
 an extraordinary circumstance. We want to make sure that all of your
 systems are protected, even those that you may have chosen to run in
 an unsupported fashion.

 In order to get access to these patches, we've created a special process
 for you. Please notify your local contact at our global technical
 support organization. Once they have confirmed that you are a current
 customer with active support subscriptions, they will help you open a
 service request and provide you with instructions on how to access the
 security patches for your earlier, unsupported operating systems.
"

Ciao, Marcus

On Mon, Sep 29, 2014 at 01:35:17PM +0200, Wilfred van Velzen wrote:

>  What about releasing this patch for the NON LTSS versions as well?
>  Considering the severity of this bug...!
>
> On Sun, Sep 28, 2014 at 7:05 PM,  <[hidden email]> wrote:
> >    SUSE Security Update: Security update for bash
> > ______________________________________________________________________________
> >
> > Announcement ID:    SUSE-SU-2014:1247-1
> > Rating:             important
> > References:         #898346 #898603 #898604
> > Cross-References:   CVE-2014-7169 CVE-2014-7186 CVE-2014-7187
> >
> > Affected Products:
> >                     SUSE Linux Enterprise Software Development Kit 11 SP3
> >                     SUSE Linux Enterprise Server 11 SP3 for VMware
> >                     SUSE Linux Enterprise Server 11 SP3
> >                     SUSE Linux Enterprise Server 11 SP2 LTSS
> >                     SUSE Linux Enterprise Server 11 SP1 LTSS
> >                     SUSE Linux Enterprise Server 10 SP4 LTSS
> >                     SUSE Linux Enterprise Server 10 SP3 LTSS
> >                     SUSE Linux Enterprise Desktop 11 SP3
> > ______________________________________________________________________________
> >
> >    An update that fixes three vulnerabilities is now available.
> >
> > Description:
> >
> >
> >    The command-line shell 'bash' evaluates environment variables, which
> >    allows the injection of characters and might be used to access files on
> >    the system in some circumstances (CVE-2014-7169).
> >
> >    Please note that this issue is different from a previously fixed
> >    vulnerability tracked under CVE-2014-6271 and is less serious due to the
> >    special, non-default system configuration that is needed to create an
> >    exploitable situation.
> >
> >    To remove further exploitation potential we now limit the
> >    function-in-environment variable to variables prefixed with BASH_FUNC_.
> >    This hardening feature is work in progress and might be improved in later
> >    updates.
> >
> >    Additionally, two other security issues have been fixed:
> >
> >        * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
> >        * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.
> >
> >    Security Issues:
> >
> >        * CVE-2014-7169
> >          <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169>
> >        * CVE-2014-7186
> >          <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186>
> >        * CVE-2014-7187
> >          <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187>
> >
> >
> > Patch Instructions:
> >
> >    To install this SUSE Security Update use YaST online_update.
> >    Alternatively you can run the command listed for your product:
> >
> >    - SUSE Linux Enterprise Software Development Kit 11 SP3:
> >
> >       zypper in -t patch sdksp3-bash-9780
> >
> >    - SUSE Linux Enterprise Server 11 SP3 for VMware:
> >
> >       zypper in -t patch slessp3-bash-9780
> >
> >    - SUSE Linux Enterprise Server 11 SP3:
> >
> >       zypper in -t patch slessp3-bash-9780
> >
> >    - SUSE Linux Enterprise Server 11 SP2 LTSS:
> >
> >       zypper in -t patch slessp2-bash-9781
> >
> >    - SUSE Linux Enterprise Server 11 SP1 LTSS:
> >
> >       zypper in -t patch slessp1-bash-9782
> >
> >    - SUSE Linux Enterprise Desktop 11 SP3:
> >
> >       zypper in -t patch sledsp3-bash-9780
> >
> >    To bring your system up-to-date, use "zypper patch".
> >
> >
> > Package List:
> >
> >    - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
> >
> >       readline-devel-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):
> >
> >       readline-devel-32bit-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
> >
> >       libreadline5-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
> >
> >       bash-3.2-147.22.1
> >       bash-doc-3.2-147.22.1
> >       libreadline5-5.2-147.22.1
> >       readline-doc-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
> >
> >       libreadline5-32bit-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
> >
> >       bash-3.2-147.22.1
> >       bash-doc-3.2-147.22.1
> >       libreadline5-5.2-147.22.1
> >       readline-doc-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
> >
> >       libreadline5-32bit-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP3 (ia64):
> >
> >       bash-x86-3.2-147.22.1
> >       libreadline5-x86-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):
> >
> >       bash-3.2-147.14.22.1
> >       bash-doc-3.2-147.14.22.1
> >       libreadline5-5.2-147.14.22.1
> >       readline-doc-5.2-147.14.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64):
> >
> >       libreadline5-32bit-5.2-147.14.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):
> >
> >       bash-3.2-147.14.22.1
> >       bash-doc-3.2-147.14.22.1
> >       libreadline5-5.2-147.14.22.1
> >       readline-doc-5.2-147.14.22.1
> >
> >    - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64):
> >
> >       libreadline5-32bit-5.2-147.14.22.1
> >
> >    - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
> >
> >       bash-3.1-24.34.1
> >       readline-5.1-24.34.1
> >       readline-devel-5.1-24.34.1
> >
> >    - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
> >
> >       readline-32bit-5.1-24.34.1
> >       readline-devel-32bit-5.1-24.34.1
> >
> >    - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
> >
> >       bash-3.1-24.34.1
> >       readline-5.1-24.34.1
> >       readline-devel-5.1-24.34.1
> >
> >    - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
> >
> >       readline-32bit-5.1-24.34.1
> >       readline-devel-32bit-5.1-24.34.1
> >
> >    - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
> >
> >       bash-3.2-147.22.1
> >       bash-doc-3.2-147.22.1
> >       libreadline5-5.2-147.22.1
> >       readline-doc-5.2-147.22.1
> >
> >    - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
> >
> >       libreadline5-32bit-5.2-147.22.1
> >
> >
> > References:
> >
> >    http://support.novell.com/security/cve/CVE-2014-7169.html
> >    http://support.novell.com/security/cve/CVE-2014-7186.html
> >    http://support.novell.com/security/cve/CVE-2014-7187.html
> >    https://bugzilla.suse.com/show_bug.cgi?id=898346
> >    https://bugzilla.suse.com/show_bug.cgi?id=898603
> >    https://bugzilla.suse.com/show_bug.cgi?id=898604
> >    http://download.suse.com/patch/finder/?keywords=01d7685e480d31be1641e84591918b9e
> >    http://download.suse.com/patch/finder/?keywords=1143502d673561f6e5895393ba93df6f
> >    http://download.suse.com/patch/finder/?keywords=7c3a2e9a2aa61a2702de17e1ed7a7f43
> >    http://download.suse.com/patch/finder/?keywords=b6868a6fc575e34338a7d5fd7491f09f
> >    http://download.suse.com/patch/finder/?keywords=d6f3fbe6b7cd7f9bd580be31dd2ada90
> >
> > --
> > To unsubscribe, e-mail: [hidden email]
> > For additional commands, e-mail: [hidden email]
> >
>
>
>
> --
> Met vriendelijke groet / Best regards,
> Wilfred van Velzen
> --
> To unsubscribe, e-mail: [hidden email]
> To contact the owner, e-mail: [hidden email]
>
--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Joe Schönberg
Hello all,

Am Montag, 29. September 2014 13:48:03 schrieb Marcus Meissner:
> Hi,
>
> Let me refer you to:
> https://www.suse.com/support/shellshock/

How to find the packages for SLES11SP2 then?

My system is under patch support and registered, but:

zypper in -t patch sleman17sp2-bash-9779
Loading repository data...
Reading installed packages...
'sleman17sp2-bash-9779' not found in package names. Trying capabilities.
No provider of 'patch:sleman17sp2-bash-9779' found.

I hoped the patch was installed automatically via my update script
while I was in holiday - for the non enterprise Suse systems it was ...

The bash version of my SLES11SP2 is

GNU bash, version 3.2.51(1)-release (x86_64-suse-linux-gnu)

and still vulnerable regarding the usual test script.

I have still pending

kernel-default-3.0.101-0.7.17.1 kernel-default-base-3.0.101-0.7.17.1

which I don't want to install just now because most kernel patches had
broken multipathing in the past.
Is there a dependency with that kernel patch?


Joe
--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Chris Ellis
Hi Joe

On Wed, Oct 8, 2014 at 10:49 AM, Joe Schönberg <[hidden email]> wrote:

> Hello all,
>
> Am Montag, 29. September 2014 13:48:03 schrieb Marcus Meissner:
>> Hi,
>>
>> Let me refer you to:
>>       https://www.suse.com/support/shellshock/
>
> How to find the packages for SLES11SP2 then?
>
> My system is under patch support and registered, but:
>
> zypper in -t patch sleman17sp2-bash-9779
> Loading repository data...
> Reading installed packages...
> 'sleman17sp2-bash-9779' not found in package names. Trying capabilities.
> No provider of 'patch:sleman17sp2-bash-9779' found.
>
> I hoped the patch was installed automatically via my update script
> while I was in holiday - for the non enterprise Suse systems it was ...
>
> The bash version of my SLES11SP2 is
>
> GNU bash, version 3.2.51(1)-release (x86_64-suse-linux-gnu)
>
> and still vulnerable regarding the usual test script.
>
> I have still pending
>
> kernel-default-3.0.101-0.7.17.1 kernel-default-base-3.0.101-0.7.17.1
>
> which I don't want to install just now because most kernel patches had
> broken multipathing in the past.
> Is there a dependency with that kernel patch?
>
>
> Joe
>

Rather than asking the openSUSE community, would it not be better to ask SUSE,
if you've got a support agreement with them, then raise a ticket.

Reading: https://www.suse.com/support/shellshock/ points me to the patch finder,
which lists:

  https://download.suse.com/Download?buildid=nNXClbWqawg~

Also, have you tried:

  zypper update bash

or

  zypper patch --cve CVE-2014-6271


Regards,
Chris
--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Joe Schönberg
Hello Chris,

Am Mittwoch, 8. Oktober 2014 12:23:22 schrieb Chris Ellis:

>
> Rather than asking the openSUSE community, would it not be better to ask SUSE,
> if you've got a support agreement with them, then raise a ticket.

Maybe you're right, but the SLES alerts and patch instruction regarding bash
for my system could be found in this list but didn't work so I think it's a
good place to ask.

>   zypper update bash

results in

"No update candidate for 'bash-3.2-147.14.18.1.x86_64'. The highest available version is already installed."

I hoped patching such a severe bug would be easier.

Joe
--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Carlos E. R.-3
In reply to this post by Chris Ellis
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 2014-10-08 12:23, Chris Ellis wrote:

> Rather than asking the openSUSE community, would it not be better
> to ask SUSE, if you've got a support agreement with them, then
> raise a ticket.

This mail list was previously named "[hidden email]", and it
was the official channel for security issues for everybody, way before
bugzilla was invented.

On 2006-11-10 the name was changed and everybody was migrated to this
new list.


Further, when people answer to the mails posted for security announces
for *SLE*, like the OP did:


+++·····························
Date: Mon, 29 Sep 2014 21:04:16 +0200 (CEST)
From: [hidden email]
To: [hidden email]
Subject: [security-announce] SUSE-SU-2014:1247-2: important: Security
update for bash

   SUSE Security Update: Security update for bash
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1247-2
Rating:             important
References:         #898346 #898603 #898604
Cross-References:   CVE-2014-7169 CVE-2014-7186 CVE-2014-7187

Affected Products:
                    SUSE Manager 1.7 for SLE 11 SP2
______________________________________________________________________________

·····························++-


His post gets automatically sent to THIS mail list (see the "From").
So yes, the naming is confusing, but according to the set rules, he is
doing it by the book. Maybe the book should be changed.


- --
Cheers / Saludos,

                Carlos E. R.
                (from 13.1 x86_64 "Bottle" at Telcontar)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iEYEARECAAYFAlQ1FysACgkQtTMYHG2NR9XXvwCfeXCUEslHpSiQu33p1/XUncb4
MmkAoIZUIL4epKBku9Sh6+T+w7YTMdT3
=4rUL
-----END PGP SIGNATURE-----
--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Thomas Biege
In reply to this post by Joe Schönberg
On 08.10.2014 12:49, Joe Schönberg wrote:

> Hello Chris,
>
> Am Mittwoch, 8. Oktober 2014 12:23:22 schrieb Chris Ellis:
>
>>
>> Rather than asking the openSUSE community, would it not be better to ask SUSE,
>> if you've got a support agreement with them, then raise a ticket.
>
> Maybe you're right, but the SLES alerts and patch instruction regarding bash
> for my system could be found in this list but didn't work so I think it's a
> good place to ask.
>
>>   zypper update bash
>
> results in
>
> "No update candidate for 'bash-3.2-147.14.18.1.x86_64'. The highest available version is already installed."

Please try:
-----------------------------------------------------------------
root@test # rpm -q --changelog bash| head -n 14
* Fr Sep 26 2014 [hidden email]
- Add patches
  bash-3.2-BSC898604.patch for bsc#898604: functions via environment
  hardening
  bash-3.2-CVE-2014-7169.patch for bsc#898346, CVE-2014-7169:
  incremental parsing fix for function environment issue
  bash-3.2-CVE-2014-7187.patch for bsc#898603, CVE-2014-7186,
  CVE-2014-7187: bad handling of HERE documents and for loop issue

* Do Sep 18 2014 [hidden email]
- Add bash-4.2-CVE-2014-6271.patch
  to fix CVE-2014-6271, the unexpected code execution with
  environment variables (bnc#896776)
--------------------------------------------------------------



If it is not the case, please contact the SUSE support.

Bye,
Thomas

>
> Joe
>


--
Thomas Biege <[hidden email]>, Team Leader MaintenanceSecurity, CSSLP
SUSE LINUX Products GmbH
GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer
HRB 21284 (AG Nürnberg)
--
  Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
                            -- Marie von Ebner-Eschenbach


signature.asc (567 bytes) Download Attachment
Reply | Threaded
Open this post in threaded view
|

Re: [security-announce] SUSE-SU-2014:1247-1: important: Security update for bash

Joe Schönberg
Hello Thomas,

Am Mittwoch, 8. Oktober 2014 14:49:44 schrieb Thomas Biege:

> Please try:
> -----------------------------------------------------------------
> root@test # rpm -q --changelog bash| head -n 14

I checked /var/log/zypp/history before - the latest bash update is
from

* Fri Oct 11 2013 [hidden email]

> If it is not the case, please contact the SUSE support.

I did so, thanks

Joe
--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]