Bash: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201210-05 / bash
||October 20, 2012
||October 20, 2012: 1
All supported architectures
Two vulnerabilities have been found in Bash, the worst of which may
allow execution of arbitrary code.
Bash is the standard GNU Bourne Again SHell.
Two vulnerabilities have been found in Bash:
- Bash example scripts do not handle temporary files securely
- Improper bounds checking in Bash could cause a stack-based buffer
A remote attacker could entice a user to open a specially crafted Bash
script, possibly resulting in execution of arbitrary code with the
privileges of the process, or a Denial of Service condition of the Bash
A local attacker may be able to perform symlink attacks to overwrite
arbitrary files with the privileges of the user running the application
or bypass shell access restrictions.
There is no known workaround at this time.
All Bash users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-shells/bash-4.2_p37"