Security update for bash

SUSE Security Update: Security update for bash
Announcement ID: SUSE-SU-2012:0988-1
Rating: moderate
References: #770795
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP2
  • SUSE Linux Enterprise Software Development Kit 11 SP1
  • SUSE Linux Enterprise Server 11 SP2
  • SUSE Linux Enterprise Server 11 SP1 for VMware
  • SUSE Linux Enterprise Server 11 SP1
  • SUSE Linux Enterprise Server 10 SP4
  • SUSE Linux Enterprise Desktop 11 SP2
  • SUSE Linux Enterprise Desktop 11 SP1
  • SUSE Linux Enterprise Desktop 10 SP4

  • An update that fixes one vulnerability is now available.

    Description:


    Parsing the /dev/fd prefix could have lead to a stack-based
    buffer overflow which could have been exploited by
    attackers to bypass security restrictions. This has been
    fixed.

    Security Issue reference:

    * CVE-2012-3410
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp1-bash-6541
    • SUSE Linux Enterprise Software Development Kit 11 SP1:
      zypper in -t patch sdksp1-bash-6541
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp1-bash-6541
    • SUSE Linux Enterprise Server 11 SP1 for VMware:
      zypper in -t patch slessp1-bash-6541
    • SUSE Linux Enterprise Server 11 SP1:
      zypper in -t patch slessp1-bash-6541
    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp1-bash-6541
    • SUSE Linux Enterprise Desktop 11 SP1:
      zypper in -t patch sledsp1-bash-6541

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • readline-devel-5.2-147.12.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64):
    • readline-devel-32bit-5.2-147.12.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
    • libreadline5-5.2-147.12.1
    • SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64):
    • readline-devel-5.2-147.12.1
    • SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64 s390x x86_64):
    • readline-devel-32bit-5.2-147.12.1
    • SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64):
    • libreadline5-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • bash-3.2-147.12.1
    • bash-doc-3.2-147.12.1
    • libreadline5-5.2-147.12.1
    • readline-doc-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):
    • libreadline5-32bit-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP2 (ia64):
    • bash-x86-3.2-147.12.1
    • libreadline5-x86-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):
    • bash-3.2-147.12.1
    • bash-doc-3.2-147.12.1
    • libreadline5-5.2-147.12.1
    • readline-doc-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64):
    • libreadline5-32bit-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64):
    • bash-3.2-147.12.1
    • bash-doc-3.2-147.12.1
    • libreadline5-5.2-147.12.1
    • readline-doc-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64):
    • libreadline5-32bit-5.2-147.12.1
    • SUSE Linux Enterprise Server 11 SP1 (ia64):
    • bash-x86-3.2-147.12.1
    • libreadline5-x86-5.2-147.12.1
    • SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc ppc64 s390x x86_64):
    • bash-3.1-24.30.1
    • SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
    • readline-5.1-24.30.1
    • readline-devel-5.1-24.30.1
    • SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
    • readline-32bit-5.1-24.30.1
    • readline-devel-32bit-5.1-24.30.1
    • SUSE Linux Enterprise Server 10 SP4 (ia64):
    • bash-x86-3.1-24.30.1
    • readline-x86-5.1-24.30.1
    • SUSE Linux Enterprise Server 10 SP4 (ppc):
    • readline-64bit-5.1-24.30.1
    • readline-devel-64bit-5.1-24.30.1
    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
    • bash-3.2-147.12.1
    • bash-doc-3.2-147.12.1
    • libreadline5-5.2-147.12.1
    • readline-doc-5.2-147.12.1
    • SUSE Linux Enterprise Desktop 11 SP2 (x86_64):
    • libreadline5-32bit-5.2-147.12.1
    • SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64):
    • bash-3.2-147.12.1
    • bash-doc-3.2-147.12.1
    • libreadline5-5.2-147.12.1
    • readline-doc-5.2-147.12.1
    • SUSE Linux Enterprise Desktop 11 SP1 (x86_64):
    • libreadline5-32bit-5.2-147.12.1
    • SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
    • bash-3.1-24.30.1
    • readline-5.1-24.30.1
    • readline-devel-5.1-24.30.1
    • SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
    • readline-32bit-5.1-24.30.1
    • readline-devel-32bit-5.1-24.30.1

    References:

  • http://support.novell.com/security/cve/CVE-2012-3410.html
  • https://bugzilla.novell.com/770795
  • http://download.suse.com/patch/finder/?keywords=9f2f628509b07725b6cc9d5d8f9ede1a
  • http://download.suse.com/patch/finder/?keywords=c3e9a373f5df9b9efa73a076b434ff96