bash-3.2-33.AXS3.4

エラータID: AXSA:2014-553:01

Release date: 
Friday, September 26, 2014 - 14:53
Subject: 
bash-3.2-33.AXS3.4
Affected Channels: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

Description :
The GNU Bourne Again shell (Bash) is a shell or command language
interpreter that is compatible with the Bourne shell (sh). Bash
incorporates useful features from the Korn shell (ksh) and the C shell
(csh). Most sh scripts can be run by bash without modification. This
package (bash) contains bash version 3.2, which improves POSIX
compliance over previous versions.

Security issues fixed with this release:

CVE-2014-7169
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

CVE-2014-6271
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CVE-2014-7186
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

CVE-2014-7187
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Please see below CVE's link for more information.

Solution: 

update package.

Additional Info: 

N/A

Download: 

SRPMS
  1. bash-3.2-33.AXS3.4.src.rpm
    MD5: a904aa3955a9e01779f608f740ed4584
    SHA-256: 622b74082526293b9d20de66b895dea578c136f913ffaa95824ea129993d1884
    Size: 4.60 MB

Asianux Server 3 for x86
  1. bash-3.2-33.AXS3.4.i386.rpm
    MD5: 6aca90f0eff886daf620dc63dcbe05ef
    SHA-256: a2f7447ecc1ec6dc61cef21e8b5e3cd2c4bc46758209056b519ebe6da222645f
    Size: 1.79 MB

Asianux Server 3 for x86_64
  1. bash-3.2-33.AXS3.4.x86_64.rpm
    MD5: 703cb37320beee469314770ed7e57fb0
    SHA-256: 25a02c53e1169da8b61a8ed99ba6a435b696988e686476e8b0b8b2252f756c68
    Size: 1.81 MB