Описание
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
Ссылки
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.4 (исключая)
Одно из
cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:bash:4.4:patch1:*:*:*:*:*:*
cpe:2.3:a:gnu:bash:4.4:patch2:*:*:*:*:*:*
cpe:2.3:a:gnu:bash:4.4:patch3:*:*:*:*:*:*
cpe:2.3:a:gnu:bash:4.4:patch4:*:*:*:*:*:*
cpe:2.3:a:gnu:bash:4.4:patch5:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Конфигурация 3
Одно из
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
EPSS
Процентиль: 6%
0.00025
Низкий
5.5 Medium
CVSS3
6.2 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-416
CWE-416
Связанные уязвимости
CVSS3: 5.5
ubuntu
почти 9 лет назад
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
CVSS3: 3.3
redhat
почти 9 лет назад
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
CVSS3: 5.5
debian
почти 9 лет назад
popd in bash might allow local users to bypass the restricted shell an ...
EPSS
Процентиль: 6%
0.00025
Низкий
5.5 Medium
CVSS3
6.2 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-416
CWE-416