ALT-PU-2018-2880-1
Closed vulnerabilities
BDU:2019-01405
Уязвимость ограниченного командного интерпретатора rbash командной оболочки Bash, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2012-6711
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().
- http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5
- http://www.securityfocus.com/bid/108824
- https://bugzilla.redhat.com/show_bug.cgi?id=1721071
- https://support.f5.com/csp/article/K05122252
- https://support.f5.com/csp/article/K05122252?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4180-1/
- http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5
- http://www.securityfocus.com/bid/108824
- https://bugzilla.redhat.com/show_bug.cgi?id=1721071
- https://support.f5.com/csp/article/K05122252
- https://support.f5.com/csp/article/K05122252?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4180-1/
Modified: 2025-04-20
CVE-2016-7543
Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/09/26/9
- http://www.securityfocus.com/bid/93183
- http://www.securitytracker.com/id/1037812
- https://access.redhat.com/errata/RHSA-2017:1931
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7XOQSHU63Y357NHU5FPTFBM6I3YOCQB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OU3C756YPHDAAPFX76UGZBAQQQ5UMHS5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2VRBSIPZDZ75ZQ2DLITHUIDW4W26KVR/
- https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00018.html
- https://security.gentoo.org/glsa/201701-02
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/09/26/9
- http://www.securityfocus.com/bid/93183
- http://www.securitytracker.com/id/1037812
- https://access.redhat.com/errata/RHSA-2017:1931
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388115
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7XOQSHU63Y357NHU5FPTFBM6I3YOCQB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OU3C756YPHDAAPFX76UGZBAQQQ5UMHS5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2VRBSIPZDZ75ZQ2DLITHUIDW4W26KVR/
- https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00018.html
- https://security.gentoo.org/glsa/201701-02
Modified: 2025-08-06
CVE-2016-9401
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/11/17/5
- http://www.openwall.com/lists/oss-security/2016/11/17/9
- http://www.securityfocus.com/bid/94398
- https://access.redhat.com/errata/RHSA-2017:1931
- https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
- https://security.gentoo.org/glsa/201701-02
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- http://www.openwall.com/lists/oss-security/2016/11/17/5
- http://www.openwall.com/lists/oss-security/2016/11/17/9
- http://www.securityfocus.com/bid/94398
- https://access.redhat.com/errata/RHSA-2017:1931
- https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
- https://security.gentoo.org/glsa/201701-02
Modified: 2024-11-21
CVE-2019-9924
rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.
- http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html
- https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1803441
- https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
- https://security.netapp.com/advisory/ntap-20190411-0001/
- https://usn.ubuntu.com/4058-1/
- https://usn.ubuntu.com/4058-2/
- http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html
- https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1803441
- https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
- https://security.netapp.com/advisory/ntap-20190411-0001/
- https://usn.ubuntu.com/4058-1/
- https://usn.ubuntu.com/4058-2/
Closed bugs
bash4.info is not seen in the catalogue
sh4 --rpm-requires segfaults in the new version (4.3.42)
Обновить bash4 до версии 4.4