Описание
Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 4.2-4ubuntu1 |
| esm-infra-legacy/trusty | not-affected | 4.2-4ubuntu1 |
| hardy | ignored | end of life |
| lucid | ignored | |
| natty | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | |
| quantal | not-affected | 4.2-4ubuntu1 |
| raring | not-affected | 4.2-4ubuntu1 |
| saucy | not-affected | 4.2-4ubuntu1 |
Показывать по
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.
Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.
Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 ...
Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.
Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
4.6 Medium
CVSS2