RedHat: RHSA-2023-0340:01 Moderate: bash security update | LinuxSec...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: bash security update
Advisory ID:       RHSA-2023:0340-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:0340
Issue date:        2023-01-23
CVE Names:         CVE-2022-3715 
=====================================================================

1. Summary:

An update for bash is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 9) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, ppc64le, s390x, x86_64

3. Description:

The bash packages provide Bash (Bourne-again shell), which is the default
shell for Red Hat Enterprise Linux.

Security Fix(es):

* bash: a heap-buffer-overflow in valid_parameter_transform (CVE-2022-3715)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2126720 - CVE-2022-3715 bash: a heap-buffer-overflow in valid_parameter_transform

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 9):

Source:
bash-5.1.8-6.el9_1.src.rpm

aarch64:
bash-5.1.8-6.el9_1.aarch64.rpm
bash-debuginfo-5.1.8-6.el9_1.aarch64.rpm
bash-debugsource-5.1.8-6.el9_1.aarch64.rpm

ppc64le:
bash-5.1.8-6.el9_1.ppc64le.rpm
bash-debuginfo-5.1.8-6.el9_1.ppc64le.rpm
bash-debugsource-5.1.8-6.el9_1.ppc64le.rpm

s390x:
bash-5.1.8-6.el9_1.s390x.rpm
bash-debuginfo-5.1.8-6.el9_1.s390x.rpm
bash-debugsource-5.1.8-6.el9_1.s390x.rpm

x86_64:
bash-5.1.8-6.el9_1.x86_64.rpm
bash-debuginfo-5.1.8-6.el9_1.x86_64.rpm
bash-debugsource-5.1.8-6.el9_1.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 9):

aarch64:
bash-debuginfo-5.1.8-6.el9_1.aarch64.rpm
bash-debugsource-5.1.8-6.el9_1.aarch64.rpm
bash-devel-5.1.8-6.el9_1.aarch64.rpm

ppc64le:
bash-debuginfo-5.1.8-6.el9_1.ppc64le.rpm
bash-debugsource-5.1.8-6.el9_1.ppc64le.rpm
bash-devel-5.1.8-6.el9_1.ppc64le.rpm

s390x:
bash-debuginfo-5.1.8-6.el9_1.s390x.rpm
bash-debugsource-5.1.8-6.el9_1.s390x.rpm
bash-devel-5.1.8-6.el9_1.s390x.rpm

x86_64:
bash-debuginfo-5.1.8-6.el9_1.x86_64.rpm
bash-debugsource-5.1.8-6.el9_1.x86_64.rpm
bash-devel-5.1.8-6.el9_1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-3715
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/cve/CVE-2022-3715

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBY863KNzjgjWX9erEAQhIZBAAo/lY8ek5dJ6LlRQ8351XJZLUfligGFh0
1bv+iPZVNZQRBuPV/Xeuw7sUdaWRYbU6K4AbfvhVIkg4ACULbdE+Y/kIHTjdVJps
swV2+JTloh/66ogRemVatLoghmYnBjtviXz+GerKxLgy43FCtGrbh/i9tvdbEaEy
81boSU/rfbNFX5N8R90b4TSm6jtRXTnoMpvn+Bn71KrTMPEPmf8qfJX7xLOd6Ox2
ciA8Dzo++xS3L4LR/LEOlyb/gF6nnFzEkhxaGsGMy/yD3qGzyQPrK62AnsQ6l8B7
5kHCtio3YIrT5Ok3Gftm1oXu2RvcKBX/Uqv8ZptAvFd9Ish9mFa0P4eqs1rJnaDW
moabz4QUywwjP2mx5qx/4N9Wni9/Sk2NKxJKsI6UVhzJuqLDsqTC8A9a+9p+8D1s
XiksypV2DRPp++HTzVn+ttx8VUYKr7M7XvEcDAKFUSVyQ424/uwyzPjdPc5HlwgX
qVbp8rtFjktkcmYEGc974nt2aNNCv3AjP/deNOIK51jG0q/BkSJryt/vPBa2FaSe
SVz0EUb9sDbwnfQ6rmQ3lgpRZOfjX5IVZtLMztJBOC6E2UpPckveHxYWdeR/DOYA
fJ4946krE+4vtXyA+2l6URsxTJAp8ZUrOzPXgOz1sRKFWnIu7P4IKVwWuKl0Lbu+
hZv7kALzBgY=
=c7wc
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-0340:01 Moderate: bash security update

An update for bash is now available for Red Hat Enterprise Linux 9

Summary

The bash packages provide Bash (Bourne-again shell), which is the default shell for Red Hat Enterprise Linux.
Security Fix(es):
* bash: a heap-buffer-overflow in valid_parameter_transform (CVE-2022-3715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-3715 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/cve/CVE-2022-3715

Package List

Red Hat Enterprise Linux BaseOS (v. 9):
Source: bash-5.1.8-6.el9_1.src.rpm
aarch64: bash-5.1.8-6.el9_1.aarch64.rpm bash-debuginfo-5.1.8-6.el9_1.aarch64.rpm bash-debugsource-5.1.8-6.el9_1.aarch64.rpm
ppc64le: bash-5.1.8-6.el9_1.ppc64le.rpm bash-debuginfo-5.1.8-6.el9_1.ppc64le.rpm bash-debugsource-5.1.8-6.el9_1.ppc64le.rpm
s390x: bash-5.1.8-6.el9_1.s390x.rpm bash-debuginfo-5.1.8-6.el9_1.s390x.rpm bash-debugsource-5.1.8-6.el9_1.s390x.rpm
x86_64: bash-5.1.8-6.el9_1.x86_64.rpm bash-debuginfo-5.1.8-6.el9_1.x86_64.rpm bash-debugsource-5.1.8-6.el9_1.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 9):
aarch64: bash-debuginfo-5.1.8-6.el9_1.aarch64.rpm bash-debugsource-5.1.8-6.el9_1.aarch64.rpm bash-devel-5.1.8-6.el9_1.aarch64.rpm
ppc64le: bash-debuginfo-5.1.8-6.el9_1.ppc64le.rpm bash-debugsource-5.1.8-6.el9_1.ppc64le.rpm bash-devel-5.1.8-6.el9_1.ppc64le.rpm
s390x: bash-debuginfo-5.1.8-6.el9_1.s390x.rpm bash-debugsource-5.1.8-6.el9_1.s390x.rpm bash-devel-5.1.8-6.el9_1.s390x.rpm
x86_64: bash-debuginfo-5.1.8-6.el9_1.x86_64.rpm bash-debugsource-5.1.8-6.el9_1.x86_64.rpm bash-devel-5.1.8-6.el9_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

Severity
Advisory ID: RHSA-2023:0340-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0340
Issued Date: : 2023-01-23
CVE Names: CVE-2022-3715

Topic

An update for bash is now available for Red Hat Enterprise Linux 9.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.

Relevant Releases Architectures

Red Hat CodeReady Linux Builder (v. 9) - aarch64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, ppc64le, s390x, x86_64

Bugs Fixed

2126720 - CVE-2022-3715 bash: a heap-buffer-overflow in valid_parameter_transform

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.