| Summary: | bash new security issue CVE-2014-6271 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | alien, rverschelde, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/613004/ | ||
| Whiteboard: | MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok | ||
| Source RPM: | bash-4.2-37.4.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-09-24 17:45:03 CEST
David Walser
2014-09-24 17:45:09 CEST
Whiteboard:
(none) =>
MGA3TOO PoC: https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/ $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test With update should get something like.. $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test Whiteboard:
MGA3TOO =>
MGA3TOO has_procedure Direct links to a mirror that already has the packages, for the impatient :o): http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/3/i586/media/core/updates_testing/bash-4.2-48.1.mga3.i586.rpm http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/3/i586/media/core/updates_testing/bash-doc-4.2-48.1.mga3.i586.rpm http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/3/x86_64/media/core/updates_testing/bash-4.2-48.1.mga3.x86_64.rpm http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/3/x86_64/media/core/updates_testing/bash-doc-4.2-48.1.mga3.x86_64.rpm http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/4/i586/media/core/updates_testing/bash-4.2-48.1.mga4.i586.rpm http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/4/i586/media/core/updates_testing/bash-doc-4.2-48.1.mga4.i586.rpm http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/4/x86_64/media/core/updates_testing/bash-4.2-48.1.mga4.x86_64.rpm http://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/distrib/4/x86_64/media/core/updates_testing/bash-doc-4.2-48.1.mga4.x86_64.rpm Testing complete mga4 64
$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a testWhiteboard:
MGA3TOO has_procedure =>
MGA3TOO has_procedure mga4-64-ok FWIW I've confirmed the vulnerability and fix on Mageia 3 i586 and Mageia 4 i586. Testing complete mga3 32 Whiteboard:
MGA3TOO has_procedure mga4-64-ok =>
MGA3TOO has_procedure mga3-32-ok mga4-64-ok
claire robinson
2014-09-24 18:08:06 CEST
Whiteboard:
MGA3TOO has_procedure mga3-32-ok mga4-64-ok =>
MGA3TOO has_procedure mga3-32-ok mga4-32-ok mga4-64-ok Testing complete mga3 64 Whiteboard:
MGA3TOO has_procedure mga3-32-ok mga4-32-ok mga4-64-ok =>
MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok I can confirm the vulnerability and fix on Cauldron. bash still works as expected as far as I can tell. CC:
(none) =>
remi Tested ssh between various hosts also. Validating. Advisory uploaded. Could sysadmin please urgently push to 3 & 4 updates Thanks Keywords:
(none) =>
validated_update
David Walser
2014-09-24 19:06:24 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/613004/ pushed, looks there was an issue with the bot https://advisories.mageia.org/MGASA-2014-0388.html Status:
NEW =>
RESOLVED It wasn't an issue, we delayed the announcement on purpose to allow time for the update to reach the mirrors. An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2014-0388.html apparently the fix isn't complete yet and needs additional or new patching... Status:
RESOLVED =>
REOPENED A new bug will be used for the next update. Status:
REOPENED =>
RESOLVED for reference: https://bugs.mageia.org/show_bug.cgi?id=14169 |