Joined: 12 May 2004
|Posted: Sat Oct 20, 2012 2:26 am Post subject: [ GLSA 201210-05 ] Bash: Multiple vulnerabilities
|Gentoo Linux Security Advisory
Title: Bash: Multiple vulnerabilities (GLSA 201210-05)
Date: October 20, 2012
Bug(s): #251319, #431850
Two vulnerabilities have been found in Bash, the worst of which may
allow execution of arbitrary code.
Bash is the standard GNU Bourne Again SHell.
Vulnerable: < 4.2_p37
Unaffected: >= 4.2_p37
Architectures: All supported architectures
Two vulnerabilities have been found in Bash:
- Bash example scripts do not handle temporary files securely
- Improper bounds checking in Bash could cause a stack-based buffer
A remote attacker could entice a user to open a specially crafted Bash
script, possibly resulting in execution of arbitrary code with the
privileges of the process, or a Denial of Service condition of the Bash
A local attacker may be able to perform symlink attacks to overwrite
arbitrary files with the privileges of the user running the application
or bypass shell access restrictions.
There is no known workaround at this time.
All Bash users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=app-shells/bash-4.2_p37"