Security Advisory Important: bash security update

Advisory: RHSA-2014:1311-2
Type: Security Advisory
Severity: Important
Issued on: 2014-09-26
Last updated on: 2014-09-30
Affected Products: Red Hat Enterprise Linux ELS (v. 4)
Red Hat Enterprise Linux EUS (v. 5.9.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)
Red Hat Enterprise Linux Long Life (v. 5.9 server)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
CVEs (cve.mitre.org): CVE-2014-7169
CVE-2014-7186
CVE-2014-7187

Details

[Updated September 30, 2014]
This advisory has been updated with information on restarting system
services after applying this update. No changes have been made to the
original packages.

Updated bash packages that fix one security issue are now available for Red
Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise
Linux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,
Red Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat
Enterprise Linux 6.4 Extended Update Support.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

The GNU Bourne Again shell (Bash) is a shell and command language
interpreter compatible with the Bourne shell (sh). Bash is the default
shell for Red Hat Enterprise Linux.

It was found that the fix for CVE-2014-6271 was incomplete, and Bash still
allowed certain characters to be injected into other environments via
specially crafted environment variables. An attacker could potentially use
this flaw to override or bypass environment restrictions to execute shell
commands. Certain services and applications allow remote unauthenticated
attackers to provide environment variables, allowing them to exploit this
issue. (CVE-2014-7169)

Applications which directly create bash functions as environment variables
need to be made aware of changes to the way names are handled by this
update. Note that certain services, screen sessions, and tmux sessions may
need to be restarted, and affected interactive users may need to re-login.
Installing these updated packages without restarting services will address
the vulnerability, but functionality may be impacted until affected
services are restarted. For more information see the Knowledgebase article
at https://access.redhat.com/articles/1200223

Note: Docker users are advised to use "yum update" within their containers,
and to commit the resulting changes.

For additional information on CVE-2014-6271 and CVE-2014-7169, refer to the
aforementioned Knowledgebase article.

All bash users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux ELS (v. 4)

SRPMS:
bash-3.0-27.el4.4.src.rpm     MD5: 001a235625359093a61f160ca03f1692
SHA-256: ab0ad251d0e9320799746b9fbbe2a763b810f3236932fee51893c09cf0ce3547
 
IA-32:
bash-3.0-27.el4.4.i386.rpm     MD5: 64cb32f853b208a36335208e3b2ccc61
SHA-256: 59603d737c16b7733eee4946b8159c1481050457ea4bdfb60e82043f800ceebb
 
IA-64:
bash-3.0-27.el4.4.i386.rpm     MD5: 64cb32f853b208a36335208e3b2ccc61
SHA-256: 59603d737c16b7733eee4946b8159c1481050457ea4bdfb60e82043f800ceebb
bash-3.0-27.el4.4.ia64.rpm     MD5: c99b84ecd6f955b85327fc66cea22de6
SHA-256: a7abdf8b4083f7d6b1c5baadfc2f330cec0f9d8b62b6e3e218fa39d5292a8530
 
x86_64:
bash-3.0-27.el4.4.x86_64.rpm     MD5: 290ec791930135f7eb254b82b56488a5
SHA-256: 4176a2fe020b1562001c6b9822bd383f008528245dd4a29be1fcdef2f4d983c7
 
Red Hat Enterprise Linux EUS (v. 5.9.z server)

SRPMS:
bash-3.2-32.el5_9.3.src.rpm     MD5: 070e9e8101361a01c1c6251aa2ac3395
SHA-256: 94dbe7046a4df92d856be0a7710729b158063f8f1b5d4662c03226cd220302e3
 
IA-32:
bash-3.2-32.el5_9.3.i386.rpm     MD5: f1dddc4d4943ce4b0fbf17ebd7d2e03a
SHA-256: 129151a3108f4dee4e5757abaeb9ef80920945f7a4ad493412445b1e4431df2b
bash-debuginfo-3.2-32.el5_9.3.i386.rpm     MD5: 42d05af8a2f4b93053bbb0d2861fb834
SHA-256: 52b8fdb86327a9f2098db20a43c3570e89daa0daaf1ab30ff09aecdf059780c3
 
IA-64:
bash-3.2-32.el5_9.3.i386.rpm     MD5: f1dddc4d4943ce4b0fbf17ebd7d2e03a
SHA-256: 129151a3108f4dee4e5757abaeb9ef80920945f7a4ad493412445b1e4431df2b
bash-3.2-32.el5_9.3.ia64.rpm     MD5: 249a88b59df83024b0a37da0449e98cd
SHA-256: 9fdd5dca0fbd82299e5af4b3951fc76a2a9b53fb283e43f1bcf8e79375f30c85
bash-debuginfo-3.2-32.el5_9.3.i386.rpm     MD5: 42d05af8a2f4b93053bbb0d2861fb834
SHA-256: 52b8fdb86327a9f2098db20a43c3570e89daa0daaf1ab30ff09aecdf059780c3
bash-debuginfo-3.2-32.el5_9.3.ia64.rpm     MD5: 68988452a091280cdc638a40c87e0155
SHA-256: 08921cee91dbb6eaab02e68de3646eb5d788d807890f64eae3b8d97eeb5c81fe
 
PPC:
bash-3.2-32.el5_9.3.ppc.rpm     MD5: 2e2e77ea2ca8c684afa900016b231cac
SHA-256: 75293711cd05a04372941e784659d5c33832cdaec67cdbe8e6b1d21fde9970f9
bash-debuginfo-3.2-32.el5_9.3.ppc.rpm     MD5: c2694ce5dc2ec4df02e0e4e3dfd0875b
SHA-256: 37403499799b5130ab2153e56fec515985c7e3068bb53515bad8b7d6806aa733
 
s390x:
bash-3.2-32.el5_9.3.s390x.rpm     MD5: 651bf2b3bace22240526c76a92204fe3
SHA-256: dd47422c2c1722add039ab22dfdbd69411fc4a78a7942c79e04e420458ace8f7
bash-debuginfo-3.2-32.el5_9.3.s390x.rpm     MD5: f397f5d134cd09bdee78ddfef8d1e7fb
SHA-256: d83bac9b791e892e134c9da30f77d2905e96fcf6ef6045464be48b9a8f64e43b
 
x86_64:
bash-3.2-32.el5_9.3.x86_64.rpm     MD5: 78e0f62201c51f986260f1fbf9091b1f
SHA-256: 3836f4aa142081a05f2f41368e962f9bcac94c0c09f55ff86e94e894c37edd31
bash-debuginfo-3.2-32.el5_9.3.x86_64.rpm     MD5: 541c4c7d5eddf752aaa0d87b601bdba4
SHA-256: cae9963f769c98adf8e6625eb4584c4c4ccdf753ddeedd99dd504ea23bdf1476
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
bash-3.2-24.el5_6.2.src.rpm     MD5: a22fdb4b9af290ba1ee0b7faaf46c13e
SHA-256: 1aed370ac016bdc67177939795a11eef7f9b6b8a50caf3564748bd611885abad
 
IA-32:
bash-3.2-24.el5_6.2.i386.rpm     MD5: e83f215373b2927c491c464ff6b67227
SHA-256: 6f1ff312487358bc73d29aaeed7cb777d4b467d4ba38afaec072b01633530103
bash-debuginfo-3.2-24.el5_6.2.i386.rpm     MD5: 5cab57e591ad35da837db666d31bae99
SHA-256: e197a1fb990e140f2afe5b31b86a513dad918a1b281ddcd6ce97b22b118e5c49
 
IA-64:
bash-3.2-24.el5_6.2.i386.rpm     MD5: e83f215373b2927c491c464ff6b67227
SHA-256: 6f1ff312487358bc73d29aaeed7cb777d4b467d4ba38afaec072b01633530103
bash-3.2-24.el5_6.2.ia64.rpm     MD5: 9b3ba71c90ea37a03bc6ca1dd1e5a2de
SHA-256: aa8bfd0442ebc5e7d143433870379f54afadba000e29a0244237a64c44e73c3b
bash-debuginfo-3.2-24.el5_6.2.i386.rpm     MD5: 5cab57e591ad35da837db666d31bae99
SHA-256: e197a1fb990e140f2afe5b31b86a513dad918a1b281ddcd6ce97b22b118e5c49
bash-debuginfo-3.2-24.el5_6.2.ia64.rpm     MD5: 697b8377376fe212e72cfa861b708080
SHA-256: 6863cdf80e630a3500ca731122bbe6340e32162c2816a3109a29f3cd6a21dacc
 
x86_64:
bash-3.2-24.el5_6.2.x86_64.rpm     MD5: c92fe8d20db9349ab7f045efd3cf6516
SHA-256: 5a834c3ccc8147fcd6a45a9e33da31c7a15d102d0a36d6c42f31b400d70a35af
bash-debuginfo-3.2-24.el5_6.2.x86_64.rpm     MD5: 9eb14aa4b4b4b0aa87016e2922e6b836
SHA-256: 21379c443e1b6b79eafee60605847fb16867d0c1da00e93cb64bc37fab362a36
 
Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
bash-3.2-32.el5_9.3.src.rpm     MD5: 070e9e8101361a01c1c6251aa2ac3395
SHA-256: 94dbe7046a4df92d856be0a7710729b158063f8f1b5d4662c03226cd220302e3
 
IA-32:
bash-3.2-32.el5_9.3.i386.rpm     MD5: f1dddc4d4943ce4b0fbf17ebd7d2e03a
SHA-256: 129151a3108f4dee4e5757abaeb9ef80920945f7a4ad493412445b1e4431df2b
bash-debuginfo-3.2-32.el5_9.3.i386.rpm     MD5: 42d05af8a2f4b93053bbb0d2861fb834
SHA-256: 52b8fdb86327a9f2098db20a43c3570e89daa0daaf1ab30ff09aecdf059780c3
 
IA-64:
bash-3.2-32.el5_9.3.i386.rpm     MD5: f1dddc4d4943ce4b0fbf17ebd7d2e03a
SHA-256: 129151a3108f4dee4e5757abaeb9ef80920945f7a4ad493412445b1e4431df2b
bash-3.2-32.el5_9.3.ia64.rpm     MD5: 249a88b59df83024b0a37da0449e98cd
SHA-256: 9fdd5dca0fbd82299e5af4b3951fc76a2a9b53fb283e43f1bcf8e79375f30c85
bash-debuginfo-3.2-32.el5_9.3.i386.rpm     MD5: 42d05af8a2f4b93053bbb0d2861fb834
SHA-256: 52b8fdb86327a9f2098db20a43c3570e89daa0daaf1ab30ff09aecdf059780c3
bash-debuginfo-3.2-32.el5_9.3.ia64.rpm     MD5: 68988452a091280cdc638a40c87e0155
SHA-256: 08921cee91dbb6eaab02e68de3646eb5d788d807890f64eae3b8d97eeb5c81fe
 
x86_64:
bash-3.2-32.el5_9.3.x86_64.rpm     MD5: 78e0f62201c51f986260f1fbf9091b1f
SHA-256: 3836f4aa142081a05f2f41368e962f9bcac94c0c09f55ff86e94e894c37edd31
bash-debuginfo-3.2-32.el5_9.3.x86_64.rpm     MD5: 541c4c7d5eddf752aaa0d87b601bdba4
SHA-256: cae9963f769c98adf8e6625eb4584c4c4ccdf753ddeedd99dd504ea23bdf1476
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
bash-4.1.2-9.el6_2.2.src.rpm
File outdated by:  RHBA-2016:0606
    MD5: 582d670943b4066a9d38237b09c3b7c0
SHA-256: 0ec9100ed54b1e4c52bc8c9c25f21b358ae8e7962d4ffb2cb301af9833aefa1b
 
x86_64:
bash-4.1.2-9.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2016:0606
    MD5: 4680cb8bdd9c011b27482a113c0d669f
SHA-256: 115ae31d88dfa81fed513195205be3df645e4e2538bf20f22db152e968827670
bash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2016:0606
    MD5: 762993a864cea548ac2c2ee0644b996d
SHA-256: fe337c57aa366ad58dbb6ed7f2dbacb84da4ef0f5e8b3242add65305a9eb3616
bash-doc-4.1.2-9.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2016:0606
    MD5: b8c19c2fee5ac8d18cfc526450438308
SHA-256: ad30dab1a80a1e24c21a035731a9d23b3700435a52c2cb968e05caefee3747eb
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
bash-4.1.2-15.el6_4.2.src.rpm
File outdated by:  RHBA-2016:0607
    MD5: b21a1b3340c1263e94fe6248eeeb4a15
SHA-256: 413c9c018bfabd184292cd2a2449c45bfff839998332e73ae3069c261e21d783
 
x86_64:
bash-4.1.2-15.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2016:0607
    MD5: 3bd24f89ab2537d2efaf42be43637797
SHA-256: 47054c0fb4d909dacff4546d501969975da3df5855e730c6c75122ddd9fe6e73
bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2016:0607
    MD5: 5d402e378f443019b1c3275d73e31f33
SHA-256: 2893319b916482932ed7362ccd9b63ec06c8ad12279c0f0500adeb9085369e12
bash-doc-4.1.2-15.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2016:0607
    MD5: eac326cd4e4205eba488f37ebb2c145f
SHA-256: 11a350441239c90f3ac8114d96ddfc5edb0248e58ee9aaa9122ebc3a22c5fcb4
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
bash-4.1.2-15.el6_4.2.src.rpm
File outdated by:  RHBA-2016:0607
    MD5: b21a1b3340c1263e94fe6248eeeb4a15
SHA-256: 413c9c018bfabd184292cd2a2449c45bfff839998332e73ae3069c261e21d783
 
IA-32:
bash-4.1.2-15.el6_4.2.i686.rpm     MD5: 160169742c68c9bf1ce492a63c4902a8
SHA-256: 911ccfb8c666a29d3bc066d439cc13aa5243d68803acf28bc58ae4a1e9365bc6
bash-debuginfo-4.1.2-15.el6_4.2.i686.rpm     MD5: 0c87ad517425b52865ecbf9455646e10
SHA-256: a2de61b004630ffb437425bca584c4627ca6de7facd0660daa2e25462befefd2
bash-doc-4.1.2-15.el6_4.2.i686.rpm     MD5: 2f535194a3187e7c52854db6832d5bf1
SHA-256: a5d84963a749b47810898aedfcd5f7ce8106c8f1443f87b304e2afea197dc114
 
PPC:
bash-4.1.2-15.el6_4.2.ppc64.rpm     MD5: 93bf5222ef0b502af9c0f34d99ef732e
SHA-256: 8a16b8b29ddee9473f8e6b68c43ccaf1178140f1329b37b9a19b912dd51c9ace
bash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm     MD5: dc7634e0c6c1f7be9f1587d4f5d4b9bf
SHA-256: f11448d8f52c7daa013097708fb9fef377ef8ff0532e9861897145bc13d55302
bash-doc-4.1.2-15.el6_4.2.ppc64.rpm     MD5: bd43fcf977094c12b9b4ed56d5146b83
SHA-256: 64d3c564acb0b62c07ad5033f3fb2bf94f602f840eef51d02bedc7c8f126eee9
 
s390x:
bash-4.1.2-15.el6_4.2.s390x.rpm     MD5: 59a3392a50413bcc18183d3c00d368a5
SHA-256: 3ade72a46a279432c17d399871389bd7ebcd3d1416f0119b433f9c6abc1918b9
bash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm     MD5: 1befea6db0a849e4346a707134d642a0
SHA-256: f8080b7fc49bd6cb52f317ac924ae92efa2819a32c9154d257e81ccbccb6e9a8
bash-doc-4.1.2-15.el6_4.2.s390x.rpm     MD5: a05e030575657167577ae2693ae89164
SHA-256: 7a69d7a1a7e752fc0aecf69cb0c4aa371ae95c987b633f58718d99d2afda6d96
 
x86_64:
bash-4.1.2-15.el6_4.2.x86_64.rpm     MD5: 3bd24f89ab2537d2efaf42be43637797
SHA-256: 47054c0fb4d909dacff4546d501969975da3df5855e730c6c75122ddd9fe6e73
bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm     MD5: 5d402e378f443019b1c3275d73e31f33
SHA-256: 2893319b916482932ed7362ccd9b63ec06c8ad12279c0f0500adeb9085369e12
bash-doc-4.1.2-15.el6_4.2.x86_64.rpm     MD5: eac326cd4e4205eba488f37ebb2c145f
SHA-256: 11a350441239c90f3ac8114d96ddfc5edb0248e58ee9aaa9122ebc3a22c5fcb4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/