Home[1] Files[2] News[3] Contact[4] Add New[5]
- Ubuntu Security Notice USN-5380-1[6]
- Authored by Ubuntu[7] | Site security.ubuntu.com[8]
-
Ubuntu Security Notice 5380-1 - It was discovered that Bash did not properly drop privileges when the binary had the setuid bit enabled. An attacker could possibly use this issue to escalate privileges.
- systems | linux[9], ubuntu[10]
- advisories | CVE-2019-18276[11]
- MD5 |
398e01895cb77f01c7efc764c91ddba7
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
==========================================================================
Ubuntu Security Notice USN-5380-1
April 20, 2022
bash vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Bash could be used to escalate privileges.
Software Description:
- bash: GNU Bourne Again SHell
Details:
It was discovered that Bash did not properly drop privileges
when the binary had the setuid bit enabled. An attacker could
possibly use this issue to escalate privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
bash 5.0-6ubuntu1.2
Ubuntu 18.04 LTS:
bash 4.4.18-2ubuntu1.3
Ubuntu 16.04 ESM:
bash 4.3-14ubuntu1.4+esm1
Ubuntu 14.04 ESM:
bash 4.3-7ubuntu1.8+esm2
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5380-1
CVE-2019-18276
Package Information:
https://launchpad.net/ubuntu/+source/bash/5.0-6ubuntu1.2
https://launchpad.net/ubuntu/+source/bash/4.4.18-2ubuntu1.3
File Tags
- ActiveX[22] (932)
- Advisory[23] (77,154)
- Arbitrary[24] (15,042)
- BBS[25] (2,859)
- Bypass[26] (1,548)
- CGI[27] (1,010)
- Code Execution[28] (6,619)
- Conference[29] (668)
- Cracker[30] (797)
- CSRF[31] (3,267)
- DoS[32] (21,712)
- Encryption[33] (2,326)
- Exploit[34] (49,614)
- File Inclusion[35] (4,142)
- File Upload[36] (937)
- Firewall[37] (821)
- Info Disclosure[38] (2,542)
- Intrusion Detection[39] (847)
- Java[40] (2,766)
- JavaScript[41] (791)
- Kernel[42] (5,985)
- Local[43] (13,967)
- Magazine[44] (586)
- Overflow[45] (12,118)
- Perl[46] (1,410)
- PHP[47] (5,037)
- Proof of Concept[48] (2,276)
- Protocol[49] (3,280)
- Python[50] (1,384)
- Remote[51] (29,571)
- Root[52] (3,440)
- Ruby[53] (574)
- Scanner[54] (1,629)
- Security Tool[55] (7,662)
- Shell[56] (3,052)
- Shellcode[57] (1,201)
- Sniffer[58] (879)
- Spoof[59] (2,076)
- SQL Injection[60] (15,970)
- TCP[61] (2,349)
- Trojan[62] (669)
- UDP[63] (866)
- Virus[64] (657)
- Vulnerability[65] (30,349)
- Web[66] (8,955)
- Whitepaper[67] (3,709)
- x86[68] (942)
- XSS[69] (17,283)
- Other[70]
File Archives
- April 2022[71]
- March 2022[72]
- February 2022[73]
- January 2022[74]
- December 2021[75]
- November 2021[76]
- October 2021[77]
- September 2021[78]
- August 2021[79]
- July 2021[80]
- June 2021[81]
- May 2021[82]
- Older[83]
Systems
- AIX[84] (424)
- Apple[85] (1,875)
- BSD[86] (368)
- CentOS[87] (55)
- Cisco[88] (1,911)
- Debian[89] (5,947)
- Fedora[90] (1,690)
- FreeBSD[91] (1,241)
- Gentoo[92] (4,152)
- HPUX[93] (876)
- iOS[94] (317)
- iPhone[95] (108)
- IRIX[96] (220)
- Juniper[97] (67)
- Linux[98] (41,848)
- Mac OS X[99] (683)
- Mandriva[100] (3,105)
- NetBSD[101] (255)
- OpenBSD[102] (478)
- RedHat[103] (11,309)
- Slackware[104] (941)
- Solaris[105] (1,605)
- SUSE[106] (1,444)
- Ubuntu[107] (7,725)
- UNIX[108] (9,043)
- UnixWare[109] (183)
- Windows[110] (6,353)
- Other[111]
- Services
- Security Services[122]
- Hosting By
- Rokasec[123]
Read more https://packetstormsecurity.com/files/166791/USN-5380-1.txt