Patch available for GNU Bourne Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169)


This patch addresses the bug discovered in the GNU Bourne Again Shell (Bash)A flaw was found that evaluates specially formatted environment variables passed to it from another environment. 

Do you need to install this patch?

BMC Real End User Experience Monitoring (BMC EUEM) components of the following versions, 2.5.XX, 6.5.XX, 2.6.XX, and 6.6.XX, include a version of Bash that has this vulnerability.

If you have questions about whether to install this patch, contact BMC Customer Support.

Applying the patch

  1. Enable SSH on the target component.
  2. Log on to your system using the clisystem account.
  3. Run the following command:

    install https://deviceupdates.bmc.com/downloads/FLAM-131-1.0.0.zip
  4. Repeat for each remaining component.

After applying the patch

Re-establish SSH settings for all applicable components, as described in the following topics:

If a problem occurs

If you encountered problems during the installation of the patch or if you could not access the internet to run the installation, contact BMC Customer Support. 

Related topics

Release-notes-and-notices

Known-and-corrected-issues

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*