A vulnerability in Bash could potentially lead to arbitrary code execution.
|Package||app-shells/bash on all architectures|
|Affected versions||< 4.3_p46-r1|
|Unaffected versions||>= 4.3_p46-r1|
Bash is the standard GNU Bourne Again SHell.
A vulnerability was found in the way Bash expands $HOSTNAME. Injecting malicious code into $HOSTNAME could cause it to run each time Bash expands \h in the prompt string.
A remote attacker controlling the system’s hostname (i.e. via DHCP) could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.
There is no known workaround at this time.
All Bash users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-shells/bash-4.3_p46-r1"
December 13, 2016
December 13, 2016: 2