Vulnerability CVE-2014-6278: Information
Description
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
Severity: CRITICAL (10.0)
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
bash | c7 | 3.2.54-alt0.M70P.1 | 3.2.54-alt0.M70P.1.M70C.1 | ALT-PU-2014-2216-1 | 131197 | Fixed |
bash4 | sisyphus | 4.2.50-alt1 | 4.4.23-alt1 | ALT-PU-2014-2209-1 | 131156 | Fixed |
bash4 | p10 | 4.2.50-alt1 | 4.4.23-alt1 | ALT-PU-2014-2209-1 | 131156 | Fixed |
bash4 | p9 | 4.2.50-alt1 | 4.4.23-alt1 | ALT-PU-2014-2209-1 | 131156 | Fixed |
bash4 | c10f1 | 4.2.50-alt1 | 4.4.23-alt1 | ALT-PU-2014-2209-1 | 131156 | Fixed |
bash4 | c9f2 | 4.2.50-alt1 | 4.4.23-alt1 | ALT-PU-2014-2209-1 | 131156 | Fixed |