MGASA-2016-0393

Source
https://advisories.mageia.org/MGASA-2016-0393.html
Import Source
https://advisories.mageia.org/MGASA-2016-0393.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0393
Related
Published
2016-11-21T22:18:01Z
Modified
2016-11-21T21:59:36Z
Summary
Updated bash packages fix security vulnerability
Details

A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string (CVE-2016-0634).

Shells running as root inherited PS4 from the environment, allowing PS4 expansion performing command substitution. Local attacker could gain arbitrary code execution via bogus setuid binaries using system()/popen() by specially crafting SHELLOPTS+PS4 environment variables (CVE-2016-7543)

References
Credits

Affected packages

Mageia:5 / bash

Package

Name
bash
Purl
pkg:rpm/mageia/bash?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3-48.2.mga5

Ecosystem specific

{
    "section": "core"
}