SUSE Security Update: Security update for bash
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:1398-2
Rating:             moderate
References:         #1000396 #1001299 #1086247 
Cross-References:   CVE-2016-0634 CVE-2016-7543
Affected Products:
                    SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for bash fixes the following issues:

   Security issues fixed:

   - CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable
     was fixed (bsc#1001299)
   - CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed
     (bsc#1000396)

   Non-security issues fixed:

   - Fix repeating self-calling of traps due the combination of a
     non-interactive shell, a trap handler for SIGINT, an external process in
     the trap handler, and a SIGINT within the trap after the external
     process runs. (bsc#1086247)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-977=1



Package List:

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      bash-4.3-83.10.1
      bash-debuginfo-4.3-83.10.1
      bash-debugsource-4.3-83.10.1
      libreadline6-32bit-6.3-83.10.1
      libreadline6-6.3-83.10.1
      libreadline6-debuginfo-32bit-6.3-83.10.1
      libreadline6-debuginfo-6.3-83.10.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      bash-doc-4.3-83.10.1
      readline-doc-6.3-83.10.1


References:

   https://www.suse.com/security/cve/CVE-2016-0634.html
   https://www.suse.com/security/cve/CVE-2016-7543.html
   https://bugzilla.suse.com/1000396
   https://bugzilla.suse.com/1001299
   https://bugzilla.suse.com/1086247

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
https://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:1398-2 moderate: bash

October 18, 2018
An update that solves two vulnerabilities and has one errata is now available

Summary

This update for bash fixes the following issues: Security issues fixed: - CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299) - CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396) Non-security issues fixed: - Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-977=1 Package List: - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): bash-4.3-83.10.1 bash-debuginfo-4.3-83.10.1 bash-debugsource-4.3-83.10.1 libreadline6-32bit-6.3-83.10.1 libreadline6-6.3-83.10.1 libreadline6-debuginfo-32bit-6.3-83.10.1 libreadline6-debuginfo-6.3-83.10.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): bash-doc-4.3-83.10.1 readline-doc-6.3-83.10.1

References

#1000396 #1001299 #1086247

Cross- CVE-2016-0634 CVE-2016-7543

Affected Products:

SUSE Linux Enterprise Server 12-SP2-BCL

https://www.suse.com/security/cve/CVE-2016-0634.html

https://www.suse.com/security/cve/CVE-2016-7543.html

https://bugzilla.suse.com/1000396

https://bugzilla.suse.com/1001299

https://bugzilla.suse.com/1086247

Severity
Announcement ID: SUSE-SU-2018:1398-2
Rating: moderate