SUSE Security Update: Security update for bash ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:1398-2 Rating: moderate References: #1000396 #1001299 #1086247 Cross-References: CVE-2016-0634 CVE-2016-7543 Affected Products: SUSE Linux Enterprise Server 12-SP2-BCL ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: This update for bash fixes the following issues: Security issues fixed: - CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299) - CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396) Non-security issues fixed: - Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-977=1 Package List: - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): bash-4.3-83.10.1 bash-debuginfo-4.3-83.10.1 bash-debugsource-4.3-83.10.1 libreadline6-32bit-6.3-83.10.1 libreadline6-6.3-83.10.1 libreadline6-debuginfo-32bit-6.3-83.10.1 libreadline6-debuginfo-6.3-83.10.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): bash-doc-4.3-83.10.1 readline-doc-6.3-83.10.1 References: https://www.suse.com/security/cve/CVE-2016-0634.html https://www.suse.com/security/cve/CVE-2016-7543.html https://bugzilla.suse.com/1000396 https://bugzilla.suse.com/1001299 https://bugzilla.suse.com/1086247 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com https://lists.suse.com/mailman/listinfo/sle-security-updates