USN-3294-1

Source
https://ubuntu.com/security/notices/USN-3294-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3294-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3294-1
Related
Published
2017-05-17T17:06:15.319787Z
Modified
2017-05-17T17:06:15.319787Z
Summary
bash vulnerabilities
Details

Bernd Dietzel discovered that Bash incorrectly expanded the hostname when displaying the prompt. If a remote attacker were able to modify a hostname, this flaw could be exploited to execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-0634)

It was discovered that Bash incorrectly handled the SHELLOPTS and PS4 environment variables. A local attacker could use this issue to execute arbitrary code with root privileges. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-7543)

It was discovered that Bash incorrectly handled the popd command. A remote attacker could possibly use this issue to bypass restricted shells. (CVE-2016-9401)

It was discovered that Bash incorrectly handled path autocompletion. A local attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 17.04. (CVE-2017-5932)

References

Affected packages

Ubuntu:14.04:LTS / bash

Package

Name
bash
Purl
pkg:deb/ubuntu/bash?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3-7ubuntu1.7

Affected versions

4.*

4.2-5ubuntu3
4.3-1ubuntu2
4.3-2ubuntu1
4.3-3ubuntu1
4.3-4ubuntu1
4.3-4ubuntu2
4.3-6ubuntu1
4.3-7ubuntu1
4.3-7ubuntu1.1
4.3-7ubuntu1.2
4.3-7ubuntu1.3
4.3-7ubuntu1.4
4.3-7ubuntu1.5
4.3-7ubuntu1.6

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.3-7ubuntu1.7",
            "binary_name": "bash"
        },
        {
            "binary_version": "4.3-7ubuntu1.7",
            "binary_name": "bash-builtins"
        },
        {
            "binary_version": "4.3-7ubuntu1.7",
            "binary_name": "bash-dbgsym"
        },
        {
            "binary_version": "4.3-7ubuntu1.7",
            "binary_name": "bash-doc"
        },
        {
            "binary_version": "4.3-7ubuntu1.7",
            "binary_name": "bash-static"
        },
        {
            "binary_version": "4.3-7ubuntu1.7",
            "binary_name": "bash-static-dbgsym"
        }
    ]
}

Ubuntu:16.04:LTS / bash

Package

Name
bash
Purl
pkg:deb/ubuntu/bash?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3-14ubuntu1.2

Affected versions

4.*

4.3-14ubuntu1
4.3-14ubuntu1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.3-14ubuntu1.2",
            "binary_name": "bash"
        },
        {
            "binary_version": "4.3-14ubuntu1.2",
            "binary_name": "bash-builtins"
        },
        {
            "binary_version": "4.3-14ubuntu1.2",
            "binary_name": "bash-dbgsym"
        },
        {
            "binary_version": "4.3-14ubuntu1.2",
            "binary_name": "bash-doc"
        },
        {
            "binary_version": "4.3-14ubuntu1.2",
            "binary_name": "bash-static"
        },
        {
            "binary_version": "4.3-14ubuntu1.2",
            "binary_name": "bash-static-dbgsym"
        }
    ]
}