Security Bulletin: Vulnerabilities in Bash affect NVIDIA Tegra Linux L4T CVE 2014-6271, CVE 2014-7169, CVE 2014-7186, CVE 2014-7187, CVE 2014-6277, CVE 2014-6278

Answer ID 4386
Updated 02/03/2017 03:27 PM

Vulnerabilities in Bash referred to as “Shellshock”


Vulnerability Details

CVE-2014-6271

GNU Bash processes trailing strings after function definitions in the values of environment variables. This processing allows remote attackers to execute arbitrary code through a crafted environment.

CVSS Base Score: 10
CVSS Temporal Score: 8.3
CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)

CVE-2014-6277

GNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) through a crafted environment.

CVSS Base Score: 10
CVSS Temporal Score: 8.3
CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)

CVE-2014-6278

GNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary commands through a crafted environment.

CVSS Base Score: 10
CVSS Temporal Score: 8.3
CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)

CVE-2014-7169

GNU Bash processes trailing strings after certain malformed function definitions in the values of environment variables. This processing allows remote attackers to write to files and may have some other unknown impact through a crafted environment.

CVSS Base Score: 10
CVSS Temporal Score: 8.3
CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)

CVE-2014-7186

The redirection implementation in parse.y in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through crafted use-of-here documents. This issue is also known as the redir_stack issue.

CVSS Base Score: 10
CVSS Temporal Score: 8.3
CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)

CVE-2014-7187

An off-by-one error in the read_token_word function in parse.y in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through deeply nested for loops. This issue is also known as the word_lineno issue.

CVSS Base Score: 10
CVSS Temporal Score: 8.3
CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)

NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a local security or IT professional to evaluate the risk of your specific configuration.

Affected Products

CVE Product Impacted Installed Component OS
CVE-2014-6271
CVE-2014-6277
CVE-2014-6278
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187
Jetson TK1 – L4T Sample File System version < R21.1 Linux

Fixes

You can download the fixes from the NVIDIA Driver Downloads page. See Unix Drivers under option #2.

Product Product Series OS First version that includes the fix
L4T Jetson TK1- L4T Linux R21.1

Users of the current software releases R19 (derived from Ubuntu 14.04) and R16 (derived from Ubuntu 12.04) can obtain updated software directly from Canonical by using the standard package management system that Ubuntu provides. For details, see What is the CVE-2014-6271 bash vulnerability (Shellshock) and how do I fix it? on the Ask Ubuntu website.

Users of R15 and R12 releases should update to the latest software release supporting the development platform. For further questions or information about this issue, refer to the NVIDIA Developer Forums website.

All public L4T releases can be accessed from the Linux for Tegra Archive.

Mitigations

None

Acknowledgements

N/A

Revision History

Revision Date Description
2.0 February 3, 2017 Technical updates to the initial release
1.0 March 3, 2015 Initial release
Disclaimer

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.

Was this answer helpful?
Your rating has been submitted, please tell us how we can make this answer more useful.

LIVE CHAT

Chat online with one of our support agents

CHAT NOW

ASK US A QUESTION

Contact Support for assistance

CONTACT US