CVE-2016-9401
23.01.2017, 21:59
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.Enginsight
| Vendor | Product | Version |
|---|---|---|
| gnu | bash | 𝑥 < 4.4 |
| gnu | bash | 4.4:patch1 |
| gnu | bash | 4.4:patch2 |
| gnu | bash | 4.4:patch3 |
| gnu | bash | 4.4:patch4 |
| gnu | bash | 4.4:patch5 |
| debian | debian_linux | 8.0 |
| redhat | enterprise_linux_desktop | 6.0 |
| redhat | enterprise_linux_desktop | 7.0 |
| redhat | enterprise_linux_server | 6.0 |
| redhat | enterprise_linux_server | 7.0 |
| redhat | enterprise_linux_server_aus | 7.4 |
| redhat | enterprise_linux_server_aus | 7.6 |
| redhat | enterprise_linux_server_aus | 7.7 |
| redhat | enterprise_linux_server_eus | 7.4 |
| redhat | enterprise_linux_server_eus | 7.5 |
| redhat | enterprise_linux_server_eus | 7.6 |
| redhat | enterprise_linux_server_eus | 7.7 |
| redhat | enterprise_linux_server_tus | 7.6 |
| redhat | enterprise_linux_server_tus | 7.7 |
| redhat | enterprise_linux_workstation | 6.0 |
| redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| bash |
|
Common Weakness Enumeration
References