|
|
Log in / Subscribe / Register

Mageia alert MGASA-2016-0393 (bash)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0393: Updated bash packages fix security vulnerability
Date:  Mon, 21 Nov 2016 23:18:32 +0100
Message-ID:  <20161121221832.859DD9F7A2@duvel.mageia.org>

MGASA-2016-0393 - Updated bash packages fix security vulnerability Publication date: 21 Nov 2016 URL: http://advisories.mageia.org/MGASA-2016-0393.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-0634, CVE-2016-7543 Description: A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string (CVE-2016-0634). Shells running as root inherited PS4 from the environment, allowing PS4 expansion performing command substitution. Local attacker could gain arbitrary code execution via bogus setuid binaries using system()/popen() by specially crafting SHELLOPTS+PS4 environment variables (CVE-2016-7543) References: - https://bugs.mageia.org/show_bug.cgi?id=19462 - https://lists.fedoraproject.org/archives/list/package-ann... - https://lists.fedoraproject.org/archives/list/package-ann... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543 SRPMS: - 5/core/bash-4.3-48.2.mga5


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds