KB Article #176463
CVE-2014-6271 / CVE-2014-7169 - Bash:specially-crafted environment variables code injection attack
Problem
A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.Resolution
FileTransfer Direct Appliances are running SUSE Linux Enterprise Server so they should be upgraded with the latest version of bash(attached).The patch released for CVE-2014-6271 does not completely fix the reported vulnerability and a new reports has been logged under CVE-2014-7169, CVE-2014-7186 and CVE-2014-7187. Fix for all of the above four CVE-s is attached .
Checking the current version of SUSE Linux Enterprise Server:
# cat /etc/SuSE-release
- For SUSE Linux Enterprise Server 10.x please download the "SLES10.ZIP" archive attached to the article.
- For SUSE Linux Enterprise Server 11.x: please download the "SLES11.ZIP" archive attached to the article.
Applying the patch:
A) If originally released partial patch for CVE-2014-6271 has NOT been applied :
Upload the package on the Appliance and extract it in a temporary directory:
# unzip SLES1X.ZIP
Once the archive is extracted please run the following commands as root to do the upgrade:
# cd SLESX
# rpm -Fvh *.rpm
B) If originally released partial patch for CVE-2014-6271 HAS been applied :
Before applying the new fix, one might wish to prepare the already existing packages for rollback (should it be necessary). Steps to do so are:
- navigate to the temporary directory, new packages are uzipped at ;
- execute :
This will create an RPM from the corresponding previously installed package under /var/spool/repackage and install the new one.
Should you need to rollback old packages, execute :
However, even if you follow process under A) directly with partial patch for CVE-2014-6271 installed, the new packages will be installed, but no rollback rpm-s of previously installed bash package would be created.
- navigate to the temporary directory, new packages are uzipped at ;
- execute :
rpm -Fvh --repackage *.rpm
This will create an RPM from the corresponding previously installed package under /var/spool/repackage and install the new one.
Should you need to rollback old packages, execute :
cd /var/spool/repackage; rpm –Uvh --oldpackage *.rpm
However, even if you follow process under A) directly with partial patch for CVE-2014-6271 installed, the new packages will be installed, but no rollback rpm-s of previously installed bash package would be created.