An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support saved UID functionality, the saved UID is not dropped. An attacker with command execution in the shell can use enable -f for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.
Find out more about CVE-2019-18276 from the MITRE-CVE dictionary and NIST NVD
Login may be required to access defects or downloads.
Product Name | Status | Defect | Fixed | Downloads |
---|---|---|---|---|
Linux | ||||
Wind River Linux LTS 17 | Fixed |
LIN10-6803 |
10.17.41.19 | -- |
Wind River Linux 8 | Fixed |
LIN8-11867 |
8.0.0.33 | -- |
Wind River Linux 9 | Fixed |
LIN9-9417 |
9.0.0.25 | -- |
Wind River Linux 7 | Not Vulnerable | -- | -- | -- |
Wind River Linux LTS 21 | Fixed | -- | 10.21.20.1 | -- |
Wind River Linux LTS 22 | Not Vulnerable | -- | -- | -- |
Wind River Linux LTS 18 | Fixed |
LIN1018-5407 |
10.18.44.14 | -- |
Wind River Linux LTS 19 | Fixed |
LIN1019-3706 |
10.19.45.20 | -- |
Wind River Linux CD release | Fixed |
LINCD-511 |
10.20.3.0 | -- |
Wind River Linux 6 | Not Vulnerable | -- | -- | -- |
Wind River Linux LTS 23 | Not Vulnerable | -- | -- | -- |
VxWorks | ||||
VxWorks 7 | Fixed | -- | 23.09 | -- |
VxWorks 6.9 | Not Vulnerable | -- | -- | -- |
Helix Virtualization Platform Cert Edition | ||||
Helix Virtualization Platform Cert Edition | Vulnerable | -- | -- | -- |
Product Name | Status | Defect | Fixed | Downloads |
---|