{"id":"USN-2364-1","summary":"bash vulnerabilities","details":"Florian Weimer and Todd Sabin discovered that the Bash parser incorrectly\nhandled memory. An attacker could possibly use this issue to bypass certain\nenvironment restrictions and execute arbitrary code. (CVE-2014-7186,\nCVE-2014-7187)\n\nIn addition, this update introduces a hardening measure which adds prefixes\nand suffixes around environment variable names which contain shell\nfunctions.\n","modified":"2026-02-10T04:40:50Z","published":"2014-09-27T09:05:01Z","related":["UBUNTU-CVE-2014-7186","UBUNTU-CVE-2014-7187"],"upstream":["CVE-2014-7186","CVE-2014-7187","UBUNTU-CVE-2014-7186","UBUNTU-CVE-2014-7187"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2364-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-7186"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-7187"}],"affected":[{"package":{"name":"bash","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/bash@4.3-7ubuntu1.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3-7ubuntu1.4"}]}],"versions":["4.2-5ubuntu3","4.3-1ubuntu2","4.3-2ubuntu1","4.3-3ubuntu1","4.3-4ubuntu1","4.3-4ubuntu2","4.3-6ubuntu1","4.3-7ubuntu1","4.3-7ubuntu1.1","4.3-7ubuntu1.2","4.3-7ubuntu1.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"bash","binary_version":"4.3-7ubuntu1.4"},{"binary_name":"bash-builtins","binary_version":"4.3-7ubuntu1.4"},{"binary_name":"bash-static","binary_version":"4.3-7ubuntu1.4"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-7186"},{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2014-7187"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2364-1.json"}}],"schema_version":"1.7.3"}