CVE-2016-9401
23.01.2017, 21:59
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | bash | 𝑥 < 4.4 |
gnu | bash | 4.4:patch1 |
gnu | bash | 4.4:patch2 |
gnu | bash | 4.4:patch3 |
gnu | bash | 4.4:patch4 |
gnu | bash | 4.4:patch5 |
debian | debian_linux | 8.0 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_aus | 7.7 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_eus | 7.7 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_server_tus | 7.7 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
bash |
|
Common Weakness Enumeration
References