Amazon Linux 1 Security Advisory: ALAS-2017-878
Advisory Release Date: 2017-08-31 15:53 Pacific
Advisory Updated Date: 2017-08-31 23:02 Pacific
popd controlled free:
A denial of service flaw was found in the way bash handled popd commands. A poorly written shell script could cause bash to crash resulting in a local denial of service limited to a specific bash session.(CVE-2016-9401)
Arbitrary code execution via malicious hostname:
An arbitrary command injection flaw was found in the way bash processed the hostname value. A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances.(CVE-2016-0634)
Specially crafted SHELLOPTS+PS4 variables allows command substitution:
An arbitrary command injection flaw was found in the way bash processed the SHELLOPTS and PS4 environment variables. A local, authenticated attacker could use this flaw to exploit poorly written setuid programs to elevate their privileges under certain circumstances. (CVE-2016-7543)
Affected Packages:
bash
Issue Correction:
Run yum update bash to update your system.
i686:
bash-doc-4.2.46-28.37.amzn1.i686
bash-4.2.46-28.37.amzn1.i686
bash-debuginfo-4.2.46-28.37.amzn1.i686
src:
bash-4.2.46-28.37.amzn1.src
x86_64:
bash-debuginfo-4.2.46-28.37.amzn1.x86_64
bash-4.2.46-28.37.amzn1.x86_64
bash-doc-4.2.46-28.37.amzn1.x86_64