Vulnerability Details
CVE-2014-6271
GNU Bash processes trailing strings after function definitions in the values of environment variables. This processing allows remote attackers to execute arbitrary code through a crafted environment.
CVSS Base Score: 10 CVSS Temporal Score: 8.3 CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
CVE-2014-6277
GNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) through a crafted environment.
CVSS Base Score: 10 CVSS Temporal Score: 8.3 CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
CVE-2014-6278
GNU Bash through version 4.3 bash43-026 does not properly parse function definitions in the values of environment variables. This failure to properly parse function definitions allows remote attackers to execute arbitrary commands through a crafted environment.
CVSS Base Score: 10 CVSS Temporal Score: 8.3 CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
CVE-2014-7169
GNU Bash processes trailing strings after certain malformed function definitions in the values of environment variables. This processing allows remote attackers to write to files and may have some other unknown impact through a crafted environment.
CVSS Base Score: 10 CVSS Temporal Score: 8.3 CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
CVE-2014-7186
The redirection implementation in parse.y in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through crafted use-of-here documents. This issue is also known as the redir_stack issue.
CVSS Base Score: 10 CVSS Temporal Score: 8.3 CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
CVE-2014-7187
An off-by-one error in the read_token_word function in parse.y in GNU Bash through version 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly some other unspecified impact through deeply nested for loops. This issue is also known as the word_lineno issue.
CVSS Base Score: 10 CVSS Temporal Score: 8.3 CVSS 2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a local security or IT professional to evaluate the risk of your specific configuration.
Affected Products
CVE | Product | Impacted Installed Component | OS |
---|---|---|---|
CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 | Jetson TK1 – L4T | Sample File System version < R21.1 | Linux |
Fixes
You can download the fixes from the NVIDIA Driver Downloads page. See Unix Drivers under option #2.
Product | Product Series | OS | First version that includes the fix |
---|---|---|---|
L4T | Jetson TK1- L4T | Linux | R21.1 |
Users of the current software releases R19 (derived from Ubuntu 14.04) and R16 (derived from Ubuntu 12.04) can obtain updated software directly from Canonical by using the standard package management system that Ubuntu provides. For details, see What is the CVE-2014-6271 bash vulnerability (Shellshock) and how do I fix it? on the Ask Ubuntu website.
Users of R15 and R12 releases should update to the latest software release supporting the development platform. For further questions or information about this issue, refer to the NVIDIA Developer Forums website.
All public L4T releases can be accessed from the Linux for Tegra Archive.
Mitigations
None
Acknowledgements
N/A
Revision History
Revision | Date | Description |
---|---|---|
2.0 | February 3, 2017 | Technical updates to the initial release |
1.0 | March 3, 2015 | Initial release |
Disclaimer
ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.