USN-2362-1

Source
https://ubuntu.com/security/notices/USN-2362-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2362-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2362-1
Related
Published
2014-09-24T15:40:05.747013Z
Modified
2014-09-24T15:40:05.747013Z
Summary
bash vulnerability
Details

Stephane Chazelas discovered that Bash incorrectly handled trailing code in function definitions. An attacker could use this issue to bypass environment restrictions, such as SSH forced command environments.

References

Affected packages

Ubuntu:14.04:LTS / bash

Package

Name
bash
Purl
pkg:deb/ubuntu/bash?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3-7ubuntu1.1

Affected versions

4.*

4.2-5ubuntu3
4.3-1ubuntu2
4.3-2ubuntu1
4.3-3ubuntu1
4.3-4ubuntu1
4.3-4ubuntu2
4.3-6ubuntu1
4.3-7ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.3-7ubuntu1.1",
            "binary_name": "bash"
        },
        {
            "binary_version": "4.3-7ubuntu1.1",
            "binary_name": "bash-builtins"
        },
        {
            "binary_version": "4.3-7ubuntu1.1",
            "binary_name": "bash-doc"
        },
        {
            "binary_version": "4.3-7ubuntu1.1",
            "binary_name": "bash-static"
        }
    ]
}