It was discovered that Bash did not properly drop privileges when the binary had the setuid bit enabled. An attacker could possibly use this issue to escalate privileges.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "bash", "binary_version": "4.3-7ubuntu1.8+esm2" }, { "binary_name": "bash-builtins", "binary_version": "4.3-7ubuntu1.8+esm2" }, { "binary_name": "bash-static", "binary_version": "4.3-7ubuntu1.8+esm2" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "bash", "binary_version": "4.3-14ubuntu1.4+esm1" }, { "binary_name": "bash-builtins", "binary_version": "4.3-14ubuntu1.4+esm1" }, { "binary_name": "bash-static", "binary_version": "4.3-14ubuntu1.4+esm1" } ] }