CVE-2019-18276

Summary

CVECVE-2019-18276
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2019-11-28 01:15:00 UTC
Updated2023-11-07 03:06:00 UTC
DescriptionAn issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.

Risk And Classification

Problem Types: CWE-273

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Gnu Bash 5.0 beta1 All All
Application Gnu Bash 5.0 beta2 All All
Application Gnu Bash 5.0 patch1 All All
Application Gnu Bash 5.0 patch10 All All
Application Gnu Bash 5.0 patch11 All All
Application Gnu Bash 5.0 patch2 All All
Application Gnu Bash 5.0 patch3 All All
Application Gnu Bash 5.0 patch4 All All
Application Gnu Bash 5.0 patch5 All All
Application Gnu Bash 5.0 patch6 All All
Application Gnu Bash 5.0 patch7 All All
Application Gnu Bash 5.0 patch8 All All
Application Gnu Bash 5.0 patch9 All All
Application Gnu Bash 5.0 rc1 All All
Application Gnu Bash 5.0 beta1 All All
Application Gnu Bash 5.0 beta2 All All
Application Gnu Bash 5.0 patch1 All All
Application Gnu Bash 5.0 patch10 All All
Application Gnu Bash 5.0 patch11 All All
Application Gnu Bash 5.0 patch2 All All
Application Gnu Bash 5.0 patch3 All All
Application Gnu Bash 5.0 patch4 All All
Application Gnu Bash 5.0 patch5 All All
Application Gnu Bash 5.0 patch6 All All
Application Gnu Bash 5.0 patch7 All All
Application Gnu Bash 5.0 patch8 All All
Application Gnu Bash 5.0 patch9 All All
Application Gnu Bash 5.0 rc1 All All
Application Gnu Bash All All All All
Application Netapp Hci Management Node - All All All
Application Netapp Hci Management Node - All All All
Application Netapp Oncommand Unified Manager All All All All
Application Netapp Oncommand Unified Manager All All All All
Application Netapp Solidfire - All All All
Application Netapp Solidfire - All All All
Application Oracle Communications Cloud Native Core Policy 1.14.0 All All All

References

ReferenceSourceLinkTags
Oracle Critical Patch Update Advisory - April 2022 MISC www.oracle.com
Pony Mail! MLIST lists.apache.org Mailing List, Third Party Advisory
Bash: Privilege escalation (GLSA 202105-34) — Gentoo security GENTOO security.gentoo.org
CVE-2019-18276 GNU Bash Vulnerability in NetApp Products | NetApp Product Security CONFIRM security.netapp.com Third Party Advisory
commit bash-20190628 snapshot · bminor/bash@951bdaa · GitHub CONFIRM github.com Patch, Third Party Advisory
Bash 5.0 Patch 11 Privilege Escalation ≈ Packet Storm MISC packetstormsecurity.com Exploit, Third Party Advisory, VDB Entry
Zero-day vulnerability in Bash - Suidbash Google CTF Finals 2019 (pwn) - YouTube MISC www.youtube.com Exploit, Third Party Advisory
[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar lists.apache.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 159204 Oracle Enterprise Linux Security Update for bash (ELSA-2021-1679)
  • 198748 Ubuntu Security Notification for Bash Vulnerability (USN-5380-1)
  • 239319 Red Hat Update for bash (RHSA-2021:1679)
  • 591406 Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)
  • 710080 Gentoo Linux Bash Privilege escalation (GLSA 202105-34)
  • 900091 CBL-Mariner Linux Security Update for bash 4.4.18
  • 903014 Common Base Linux Mariner (CBL-Mariner) Security Update for bash (1908)
  • 906213 Common Base Linux Mariner (CBL-Mariner) Security Update for bash (1908-1)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report