Hide Forgot
A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string. References: http://seclists.org/oss-sec/2016/q3/528 Ubuntu bug: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025
Created bash tracking bugs for this issue: Affects: fedora-all [bug 1377614]
Upstream patch (for bash 4.3): http://openwall.com/lists/oss-security/2016/09/16/18
bash-4.3.42-6.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
bash-4.3.43-3.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report.
bash-4.3.42-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
An upstream patch was posted to oss-security that fixes this issue: http://seclists.org/oss-sec/2016/q3/538
Now in upstream repo: https://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-047
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0725 https://rhn.redhat.com/errata/RHSA-2017-0725.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1931 https://access.redhat.com/errata/RHSA-2017:1931