CVE-2016-9401

Priority
Description
popd in bash might allow local users to bypass the restricted shell and
cause a use-after-free via a crafted address.
Notes
 sbeattie> not sure how this has security impact
Assigned-to
mdeslaur
Package
Source: bash (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):released (4.3-7ubuntu1.7)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.3-14ubuntu1.2)
Ubuntu 18.04 LTS (Bionic Beaver):released (4.4-5ubuntu1)
Ubuntu 18.10 (Cosmic Cuttlefish):released (4.4-5ubuntu1)
Ubuntu 19.04 (Disco Dingo):released (4.4-5ubuntu1)
Patches:
Upstream:https://ftp.gnu.org/pub/gnu/bash/bash-4.4-patches/bash44-006
More Information

Updated: 2018-10-31 20:24:01 UTC (commit cfa7cf69d76449ccff972ac22f40976a08d908c2)